last executing test programs: 2m40.027110238s ago: executing program 0 (id=6878): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d00000085"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}, 0x801}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa10000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{r2}, &(0x7f0000000040), &(0x7f0000000080)=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r4}, 0x10) socketpair(0x21, 0x3, 0x3, &(0x7f00000001c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000003c0)='signal_generate\x00'}, 0x40) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) 2m39.434702748s ago: executing program 0 (id=6881): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) write$cgroup_subtree(r0, &(0x7f0000000380)=ANY=[], 0xe) 2m39.28789454s ago: executing program 0 (id=6882): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffffffd0}, {0x85, 0x0, 0x0, 0x7d}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000020400000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000000000000000001811", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) 2m38.402852764s ago: executing program 0 (id=6886): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 2m38.206941307s ago: executing program 0 (id=6887): bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x14, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRESOCT=0x0], &(0x7f0000000040)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf5e}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1000000}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000000000000000000000850000001900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_LOOKUP_ELEM(0x5, &(0x7f00000000c0)={r1, &(0x7f0000000000), &(0x7f0000000040)=""/73}, 0x70) close(0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000180)=@o_path={&(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x4000, r2}, 0x18) mkdir(0x0, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0xfc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xaf2}, 0x4831, 0x1, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0e00000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="798ce5bacc83000000e0ed2f80000000cf00000000005d51eb7cd97320959f836325fc0f0718a1d2d3779cceb04ba78b0ffaa31c5aa63685565650188efc3221adeb32422a203c3bb94fa6ab0000004759305ac2b0ea876abe83f3c71c8788676446"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r4, &(0x7f00000000c0), &(0x7f0000000000)=""/10, 0x2}, 0x20) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pim6reg1\x00', 0xe511}) close(r5) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x52, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs$namespace(0x0, &(0x7f0000000280)='ns/net\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 2m36.871264888s ago: executing program 0 (id=6891): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="00ee63a520acb8b96300"/28], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r0, 0x58, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x41000, 0x0, '\x00', r4, 0x2, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8, 0x1}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0xfa, 0x3, 0x0, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0xffff}, 0x0, 0xc8, 0x818, 0x0, 0x0, 0x400, 0x100}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x4, 0x3000000, {0x0, 0x9000000}}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, 0xffffffffffffffff, 0x3e, 0xb1, 0x2, 0x0, 0x0, @void, @value}, 0x20) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[@ANYBLOB="8f45ae34fb00117df37538"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000080)='mm_lru_activate\x00', r1, 0x0, 0x8000}, 0x18) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000ffea00000000000000ac1414aa"], 0xfdef) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)) r10 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) write$cgroup_pid(r10, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 2m21.895972361s ago: executing program 32 (id=6891): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0300000004000000040000000a00000000000000", @ANYRES32=r1, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=r1, @ANYBLOB="00ee63a520acb8b96300"/28], 0x50) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000002c0)={r0, 0x58, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000240)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x41000, 0x0, '\x00', r4, 0x2, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0x8, 0x1}, 0xa100, 0xc8, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0xfa, 0x3, 0x0, 0xfa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10001, 0xffff}, 0x0, 0xc8, 0x818, 0x0, 0x0, 0x400, 0x100}, 0x0, 0x2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f0000000040)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x24, 0x24, 0x2, [@array={0x0, 0x0, 0x0, 0x4, 0x3000000, {0x0, 0x9000000}}, @func_proto={0x0, 0x0, 0x0, 0xd, 0x2}]}}, 0xffffffffffffffff, 0x3e, 0xb1, 0x2, 0x0, 0x0, @void, @value}, 0x20) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[@ANYBLOB="8f45ae34fb00117df37538"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f0000000080)='mm_lru_activate\x00', r1, 0x0, 0x8000}, 0x18) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102033200fe08000e40000200875a65969ff57b00000000ffea00000000000000ac1414aa"], 0xfdef) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r9, 0x4030582a, &(0x7f0000000040)) r10 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) write$cgroup_pid(r10, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000680)={&(0x7f0000000000)='tlb_flush\x00', r0}, 0x10) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.859087305s ago: executing program 4 (id=7682): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b00000000000000000000000080000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r0 = bpf$MAP_CREATE(0x0, 0x0, 0xffffffffffffffbf) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f00000007c0)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000005688b782c082eb8ac3bfc3eb8900ae4f3b0ab26364e200000000cde0b507008e2b"], &(0x7f00000005c0)=""/240, 0x26, 0xf0, 0x1, 0x0, 0x0, @void, @value}, 0x28) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="160000000000000004000000fb00000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000001000000000000efff00"/28], 0x50) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) ioctl$TUNSETSNDBUF(0xffffffffffffffff, 0x400454d4, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000900)=ANY=[@ANYRESOCT=r0, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb708000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f00000009c0)=@generic={&(0x7f0000000980)='./file0\x00'}, 0x18) perf_event_open(0x0, 0x0, 0xfffffffbffffffff, r1, 0x0) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0x40047451, 0x2000000c) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(r7, &(0x7f0000000140)='io.stat\x00', 0x0, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r6}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r6}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f00000001c0)=ANY=[@ANYBLOB="823b821f17584b1d570000ff93cb03000000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000780)={{r0}, &(0x7f0000000700), &(0x7f0000000740)='%pS \x00'}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x129800, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r8, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, &(0x7f00000002c0)=[0x0, 0x0], &(0x7f0000000300), 0x0, 0x92, &(0x7f0000000800)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000440), &(0x7f0000000480), 0x8, 0xf8, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r9}, 0x10) 2.714438857s ago: executing program 2 (id=7683): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x7d}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2=0x10000000, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 2.52184954s ago: executing program 1 (id=7686): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="09000000070000000000010003"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x21, &(0x7f0000000540), 0x4) 2.450432592s ago: executing program 3 (id=7687): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xff58) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x11, &(0x7f0000001000)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @exit], {{}, {}, {}, {0x7, 0x0, 0xb, 0x0, 0x0, 0x0, 0x14000000}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 2.435684412s ago: executing program 1 (id=7689): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x141141, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8914, &(0x7f0000000080)) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000a00)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0xa2721, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x4}, 0x0, 0xffefffffffffffff, r4, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000740)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x74, 0x74, 0x5, [@enum64={0xd, 0x3, 0x0, 0x13, 0x1, 0x4, [{0x1, 0x400, 0x3}, {0x5, 0x2, 0x101}, {0x6, 0x80, 0xeb}]}, @enum={0xc, 0x7, 0x0, 0x6, 0x4, [{0xd, 0x20}, {0x1, 0x7}, {0x9, 0x6}, {0x5}, {0x3, 0x7}, {0xa, 0x100}, {0x5, 0x2af4bf8c}]}]}, {0x0, [0x2e, 0x2e, 0x0]}}, &(0x7f0000000800)=""/213, 0x91, 0xd5, 0x1, 0x2, 0x0, @void, @value}, 0x28) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f00000006c0), 0x20005, r3}, 0x38) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r5}, 0x10) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000180)=@framed, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2004, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0, r6}, 0x10) 2.381206322s ago: executing program 3 (id=7690): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext, 0x0, 0x80000000c8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r3 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a00)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r6}, 0x10) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b0000000000000000000000ff00ac1414aa"], 0xfdef) 2.272731624s ago: executing program 3 (id=7691): syz_open_procfs$namespace(0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000100000800000004000000bb7f1a004d00feff000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x4c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xd, 0xffffffffffffffff, 0x6) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x14}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.949203169s ago: executing program 4 (id=7694): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000b70200000200000085000000860000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRES8], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, &(0x7f0000000000), &(0x7f0000000040), 0x2}, 0x20) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x6, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x400000000008, 0x9}, 0x20, 0x200, 0x9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x40, 0x0, 0x7}, 0x0, 0xf, r2, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) write$cgroup_subtree(r4, &(0x7f00000005c0)=ANY=[], 0xb) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'ip6gre0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r7) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000001c0)={0x0, r2, 0x0, 0x0, 0x0}, 0x30) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a1, &(0x7f0000000080)) 1.941687909s ago: executing program 3 (id=7695): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0xfd, 0x0, 0x0, 0xd2, 0x0, 0x0, 0x60300, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x2}, 0x8000, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb790700117df37538e486dd6317ce22000000000000000000000000000000007fc5f603ff65ec5deb000071673fa79d93014b8e7781c2", @ANYRES8=r3, @ANYRESHEX=r4], 0xfdef) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0xa, &(0x7f0000000240)=[0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x25, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x96, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000a00)=r7, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x1a, 0x3, &(0x7f0000000000)=@raw=[@jmp={0x5, 0x0, 0x3, 0x0, 0x3, 0x40, 0xfffffffffffffffc}, @cb_func={0x18, 0x2, 0x4, 0x0, 0x6}], &(0x7f0000000080)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x10, '\x00', 0x0, @tracing=0x1a, r6, 0x8, &(0x7f0000000180)={0x2, 0x1}, 0x8, 0x10, &(0x7f00000001c0)={0x3, 0x2, 0x80000001, 0x2}, 0x10, r7, 0xffffffffffffffff, 0x5, 0x0, &(0x7f0000000280)=[{0x2, 0x2, 0xd, 0x4}, {0x0, 0x4, 0x1}, {0x4, 0x3, 0x2, 0x5}, {0x3, 0x3, 0x7, 0xc}, {0x1, 0x1, 0xa}], 0x10, 0x80, @void, @value}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000400018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='consume_skb\x00', r9}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r10, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000004340)=[{&(0x7f0000000f00)="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", 0xd4d}], 0x1}, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.91603425s ago: executing program 5 (id=7696): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x6, 0x8, &(0x7f0000000200)=ANY=[@ANYRESDEC, @ANYRESDEC=r0, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095", @ANYRES8=r0, @ANYRES32=r0, @ANYRES8=r0], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000140)={{r0, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f00000000c0)='%-5lx \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000017c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r3, 0xffffffffffffffff}, &(0x7f0000000800), &(0x7f0000000840)=r4}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r6}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c00)={r4, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000005c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xb8, &(0x7f0000000600)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000640), &(0x7f0000000740), 0x8, 0x64, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000060000200000000bfd88dd2899d520b53c383edf64737a124d2301a957b82b3926de2d74087fb62e46868ff3cf8a0aabc222db36ccf7846695c62a8c57146062ff8c2297f3323d24971d9c720b98d36c839eb91f76763d3571fee", @ANYRES32, @ANYBLOB="0200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000d00)={0x6, 0x1b, &(0x7f00000008c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0xffffffea}, [@map_fd={0x18, 0xb, 0x1, 0x0, r2}, @cb_func={0x18, 0x5, 0x4, 0x0, 0xfffffffffffffffb}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @initr0={0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, @generic={0x3, 0xd, 0x2, 0x8, 0xb5c0}, @func={0x85, 0x0, 0x1, 0x0, 0x1}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @generic={0x9, 0x2, 0x5, 0x9, 0x1}, @alu={0x4, 0x1, 0xd, 0x8, 0xb, 0x10, 0xfffffffffffffffc}]}, &(0x7f0000000180)='syzkaller\x00', 0x4, 0x45, &(0x7f00000004c0)=""/69, 0x40f00, 0x2a, '\x00', r7, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000c40)={0x5, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000c80)=[r5, r0, r8, r3, r3, r0, r3], &(0x7f0000000cc0)=[{0x5, 0x1, 0x1, 0x5}, {0x2, 0x1, 0x10, 0x4}], 0x10, 0x6, @void, @value}, 0x94) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='fib6_table_lookup\x00'}, 0x10) write$cgroup_subtree(r11, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd"], 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 1.744613543s ago: executing program 2 (id=7697): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xff58) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) syz_clone(0x30002000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x11, &(0x7f0000001000)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @exit], {}, {0x95, 0x0, 0x0, 0xf00}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.726856383s ago: executing program 4 (id=7698): socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8111033300fc08000000110200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) (async) bpf$ITER_CREATE(0x21, &(0x7f0000000240)={r1}, 0x8) (async) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r3}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20882, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x1, @perf_bp={0x0}, 0x0, 0xc8, 0x1, 0x6, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0x4, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x16}, 0x400}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="7d000000f8fffeff080000000700000000040226e4231b14e75a5e6c251fa38ef501d8b346107a681cdb758ff3", @ANYRES32=0x1, @ANYBLOB="a200"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0500000002000000040000000a00"/28], 0x50) (async) write$cgroup_subtree(r5, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102032900fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x15, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b402000000000000791100000000000085000000440000009500000000000000359bb9f43d86b136000000008762000000f33ad18fa9b151092e9172d8ca80be3fd2fe548fa036cf6151d76a8b71e51807e420da77440079a86cdda66fedd4922a95cd42662d9dafae9602325ef1a30b8aba9c271a51a56f7f73de45084cd90fa9ac55778d6c272c473383785c34c5b372e52138cf7f6c081c29a5eec551cd928f1f289175a9ff"], &(0x7f0000000280)='syzkaller\x00', 0x4, 0xc5, &(0x7f0000000300)=""/197, 0x0, 0x0, '\x00', 0x0, @sk_reuseport, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f00000002c0), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 1.670277614s ago: executing program 2 (id=7699): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x21, &(0x7f0000000540), 0x4) 1.645767564s ago: executing program 4 (id=7700): r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r2}, 0x18) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) r3 = perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12144, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000280), 0x84}, 0x38) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x3, 0xec65, 0xfffffff7, 0xe480, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x1, 0x0, @value, @void, @void, @value}, 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x20, &(0x7f00000002c0)={&(0x7f0000000780)=""/129, 0x81, 0x0, &(0x7f0000000280)=""/32, 0x20}}, 0x10) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x15) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x2}, 0xc42a, 0x200000000000000, 0x7, 0x5, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) close(r3) 1.573884505s ago: executing program 2 (id=7701): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x11, &(0x7f0000001000)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@func={0x85, 0x0, 0x1, 0x0, 0x1}, @exit], {{}, {}, {}, {0x7, 0x0, 0xb, 0x0, 0x0, 0x0, 0x8000000}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.515162756s ago: executing program 1 (id=7702): perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x14, 0x17, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x7d}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x700, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 1.514091566s ago: executing program 5 (id=7703): r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r2}, 0x18) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) r3 = perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12144, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000280), 0x84}, 0x38) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x3, 0xec65, 0xfffffff7, 0xe480, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x1, 0x0, @value, @void, @void, @value}, 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x20, &(0x7f00000002c0)={&(0x7f0000000780)=""/129, 0x81, 0x0, &(0x7f0000000280)=""/32, 0x20}}, 0x10) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x15) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x2}, 0xc42a, 0x200000000000000, 0x7, 0x5, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) close(r3) 1.464551967s ago: executing program 2 (id=7704): syz_clone(0x900600, &(0x7f0000000080)="ea9b", 0x2, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140)="c2b6626f0e3a47991e322c35aed595451f4402c3ed1ccd88d710bf1bfd492727dcc965e3ee817ffec11939859dd01093800af4c56c3b7b4e74c5b3438f389c12a796af91fa191947b0d3ed10f72bff5abbc74eabeff3f5fdd05e9182368a41445d6cc73b790bc0a1") bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000086"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001040)=@bpf_tracing={0x1a, 0xd, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x74, 0x0, 0x0, 0x0, 0x7}, [@map_fd={0x18, 0x9, 0x1, 0x0, r1}, @map_idx={0x18, 0x9, 0x5, 0x0, 0xa}, @alu={0x7, 0x0, 0x6, 0x1, 0xb, 0x18, 0xfffffffffffffff0}, @tail_call={{0x18, 0x2, 0x1, 0x0, r1}}]}, &(0x7f00000001c0)='syzkaller\x00', 0x81, 0x98, &(0x7f0000000700)=""/152, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000c40)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000c80)={0x3, 0x5, 0xf5e4, 0x101}, 0x10, 0x199cd, 0xffffffffffffffff, 0x0, &(0x7f0000001000)=[r0, r1, r1, 0xffffffffffffffff, r1, r1], 0x0, 0x10, 0x7b, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000200), 0x3, r2}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8000, 0x0, 0x0, 0x6, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1f, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0xffd0}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x0}, @generic={0x66, 0x8}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa, 0x0, 0x2}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='sched_process_fork\x00', r4}, 0x10) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000007900000000000000180000000000000000000000000000009500000000000000d50a0000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x21) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0xc, 0x11, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014004000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000085100000010000009500000000000000bf91000000000000b7020000000000008500000000000000b70000000000000095000000000000008b"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0x15, 0x17, &(0x7f00000007c0)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xc00}, {}, {}, {0x85, 0x0, 0x0, 0x7d}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 1.092983172s ago: executing program 3 (id=7705): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="0000000000000000b70200000200000085000000860000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRES8], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, &(0x7f0000000000), &(0x7f0000000040), 0x2}, 0x20) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x6, 0x44, 0x1, 0x0, 0x0, 0x3, 0x60014, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x400000000008, 0x9}, 0x20, 0x200, 0x9, 0x4, 0xc, 0x0, 0x200, 0x0, 0x40, 0x0, 0x7}, 0x0, 0xf, r2, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = openat$cgroup_subtree(r3, &(0x7f0000000200), 0x2, 0x0) write$cgroup_subtree(r4, &(0x7f0000000400)=ANY=[@ANYBLOB='-cpu'], 0x5) write$cgroup_subtree(r4, &(0x7f00000005c0)=ANY=[], 0xb) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'ip6gre0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r7 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) close(r7) socketpair(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a0, &(0x7f0000000080)) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x89a1, &(0x7f0000000080)) 1.079521863s ago: executing program 5 (id=7706): perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000007000000008000000100000000000000", @ANYBLOB, @ANYRES32=0x0, @ANYBLOB='\x00'/20], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000380)='cgroup.threads\x00', 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001300)={&(0x7f0000000c00)='net_dev_start_xmit\x00', r5}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r6, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r7], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r8, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r9}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r10, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x200, 0x11, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 1.074462473s ago: executing program 4 (id=7707): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x18) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x42008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x17}, 0x0, 0xc8, 0x0, 0x0, 0x34}, 0x0, 0x7, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x10}}], 0x10}, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r3) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x5}, [@ringbuf_output={{0x18, 0x2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x43}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r4}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x200400, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x13, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x0}, @generic={0x66}, @initr0, @exit, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x6f) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8923, &(0x7f0000000000)={'vlan1\x00', @broadcast}) 765.227298ms ago: executing program 3 (id=7708): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0x5421, 0x110e22ffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000880)=ANY=[@ANYRES32=r0, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0b34e5b71300000000040000090000000100000045c1e3e05e77d6f30e89e9243bc7321d523ee01e10eb052ad40448b8c6e30f0910884b998d9680da224c78d061703b2d78fb", @ANYRES32, @ANYRES32=0x0, @ANYBLOB="ec19ddd42d2609effad31469bde432c1cdc323816c420e43886b931cdff5a974d2f14a19a8fc0401bae3276dc1793a1c41cf728252f0de76140fe7a74ec94f7f61c1d480", @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0xe, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000000006c"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) write$cgroup_subtree(r2, &(0x7f0000000240)=ANY=[], 0xfdef) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x4030582a, &(0x7f0000000040)) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000001000000000018110000", @ANYRES64=0x0, @ANYRES32], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x7, 0x0, &(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000a40)="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", 0x5a9}], 0x1}, 0x0) setsockopt$sock_attach_bpf(r6, 0x1, 0x21, &(0x7f0000000540), 0x4) sendmsg$tipc(r6, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYRESDEC=r6], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001e40)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) 657.594139ms ago: executing program 1 (id=7709): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={0x0}, 0x18) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x1a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x7, 0x0, 0x2, 0xfffffffe}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x75, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000840)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="180000001f000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x10, 0x4, 0x8, 0x7, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000940)={{r4}, &(0x7f00000008c0), &(0x7f0000000900)=r3}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) 337.190235ms ago: executing program 1 (id=7710): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000786c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000080), 0x200}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0), 0x0, 0x3}, 0x38) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) r4 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000200)={0x0, r1}, 0x8) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0xb, 0x20005, 0xf, 0x4, 0x10885, r2, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @value=r4}, 0x50) close(0xffffffffffffffff) bpf$ITER_CREATE(0x21, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x89f0, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r5) 254.514486ms ago: executing program 5 (id=7711): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x21, &(0x7f0000000540), 0x4) 134.702538ms ago: executing program 5 (id=7712): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000900)={0x2, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000800000800000004000000bb7f1a004d00feff000000009500000000000000"], &(0x7f0000000000)='syzkaller\x00', 0x5, 0x93, &(0x7f00000005c0)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x61e5cc96, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x4c) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x14}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) 73.243449ms ago: executing program 4 (id=7713): perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x4}, 0x2020, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xd0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x80, 0x0, 0x0, 0xffdffffc, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0x4}, 0x0, 0x4, 0x0, 0x1, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_bp={0x0, 0x4}, 0x2020, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xd0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x5, 0x80, 0x0, 0x0, 0xffdffffc, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x7, 0x4}, 0x0, 0x4, 0x0, 0x1, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) 55.577989ms ago: executing program 1 (id=7714): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x37}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x1c}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r6}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$unix(r0, &(0x7f0000000300)={&(0x7f00000000c0), 0x6e, &(0x7f0000000280)=[{&(0x7f0000000140)=""/225, 0xe1}, {&(0x7f0000000240)=""/14, 0xe}, {&(0x7f0000000700)=""/4096, 0x1000}], 0x3, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x10002) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x1e, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x37}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) (async) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r4}, 0x10) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x3, 0x2, 0x1, 0x1c}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xd, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xe00, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r5}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r6}, 0x10) (async) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) (async) recvmsg$unix(r0, &(0x7f0000000300)={&(0x7f00000000c0), 0x6e, &(0x7f0000000280)=[{&(0x7f0000000140)=""/225, 0xe1}, {&(0x7f0000000240)=""/14, 0xe}, {&(0x7f0000000700)=""/4096, 0x1000}], 0x3, &(0x7f00000002c0)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x30}, 0x10002) (async) 6.5793ms ago: executing program 5 (id=7715): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2002, 0x4, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8, 0x0, 0x0, 0x1b}, {{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x6}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xd00}, {0x85, 0x0, 0x0, 0x5}, {0x4, 0x1, 0xb, 0x9, 0xa}}, {{0x5, 0x0, 0x3}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x6}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x8}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {0x7, 0x1, 0xb, 0x4, 0x2}, {0x7, 0x0, 0x0, 0x6}, {0x4, 0x0, 0x7}, {0x18, 0x6, 0x2, 0x0, r0}, {}, {0x46, 0x8, 0xfff0, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x8}, {0x85, 0x0, 0x0, 0x5}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000000)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, &(0x7f0000000040)}, 0x0) 0s ago: executing program 2 (id=7716): r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000040)=0xffffffffffffffff, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000280)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0, r2}, 0x18) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.current\x00', 0x26e1, 0x0) r3 = perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12144, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x4, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r7) recvmsg$unix(r6, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x12, 0x3, 0xec65, 0xfffffff7, 0xe480, 0xffffffffffffffff, 0x3, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x4, 0x1, 0x0, @value, @void, @void, @value}, 0x50) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000580)={0xffffffffffffffff, 0x20, &(0x7f00000002c0)={&(0x7f0000000780)=""/129, 0x81, 0x0, &(0x7f0000000280)=""/32, 0x20}}, 0x10) write$cgroup_subtree(r8, &(0x7f0000000000)=ANY=[], 0x15) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x2}, 0xc42a, 0x200000000000000, 0x7, 0x5, 0x0, 0x200000}, 0x0, 0x0, 0xffffffffffffffff, 0x8) close(r3) kernel console output (not intermixed with test programs): ab_free+0x130/0x160 [ 245.244590][ T6172] ? kfree_skbmem+0x10c/0x180 [ 245.249259][ T6172] ? kfree_skbmem+0x10c/0x180 [ 245.253931][ T6172] __bpf_trace_kmem_free+0x6f/0x90 [ 245.259032][ T6172] ? kfree_skbmem+0x10c/0x180 [ 245.263714][ T6172] __traceiter_kmem_cache_free+0x2e/0x50 [ 245.269341][ T6172] kmem_cache_free+0x2ac/0x2d0 [ 245.274098][ T6172] kfree_skbmem+0x10c/0x180 [ 245.278589][ T6172] kfree_skb+0xc1/0x2f0 [ 245.282743][ T6172] unix_gc+0xd91/0x1020 [ 245.286892][ T6172] ? wait_for_unix_gc+0x1f0/0x1f0 [ 245.291908][ T6172] ? __kasan_check_write+0x14/0x20 [ 245.297007][ T6172] ? _raw_spin_lock+0x8e/0xe0 [ 245.301674][ T6172] ? _raw_spin_trylock_bh+0x130/0x130 [ 245.307036][ T6172] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 245.312832][ T6172] ? skb_dequeue+0x125/0x160 [ 245.317453][ T6172] ? unix_release_sock+0x77c/0xad0 [ 245.322554][ T6172] unix_release_sock+0x94c/0xad0 [ 245.327583][ T6172] ? unix_set_peek_off+0xa0/0xa0 [ 245.332513][ T6172] ? down_write+0xac/0x110 [ 245.336919][ T6172] ? down_read_killable+0xe0/0xe0 [ 245.341934][ T6172] unix_release+0x4e/0x80 [ 245.346252][ T6172] sock_close+0xe0/0x270 [ 245.350484][ T6172] ? sock_mmap+0xa0/0xa0 [ 245.354730][ T6172] __fput+0x2fb/0x770 [ 245.358708][ T6172] ____fput+0x15/0x20 [ 245.362680][ T6172] task_work_run+0x127/0x190 [ 245.367259][ T6172] exit_to_user_mode_loop+0xcb/0xe0 [ 245.372450][ T6172] syscall_exit_to_user_mode+0x68/0x90 [ 245.377892][ T6172] do_syscall_64+0x3d/0x40 [ 245.382299][ T6172] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 245.388176][ T6172] RIP: 0033:0x7f51f6e25929 [ 245.392582][ T6172] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 245.412183][ T6172] RSP: 002b:00007f51f548e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 245.420594][ T6172] RAX: 0000000000000000 RBX: 00007f51f704cfa0 RCX: 00007f51f6e25929 [ 245.428566][ T6172] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000008 [ 245.436531][ T6172] RBP: 00007f51f548e090 R08: 0000000000000000 R09: 0000000000000000 [ 245.444496][ T6172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 245.452460][ T6172] R13: 0000000000000000 R14: 00007f51f704cfa0 R15: 00007ffde8b8a0e8 [ 246.205627][ T6216] device pim6reg1 entered promiscuous mode [ 249.026497][ T6307] device syzkaller0 entered promiscuous mode [ 249.999874][ T6378] device sit0 left promiscuous mode [ 250.160971][ T6378] device sit0 entered promiscuous mode [ 251.995613][ T24] audit: type=1400 audit(1749586241.039:142): avc: denied { create } for pid=6421 comm="syz.2.2130" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 255.259936][ T6506] device veth0_vlan left promiscuous mode [ 255.266045][ T6506] device veth0_vlan entered promiscuous mode [ 255.431133][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 255.439383][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 255.562793][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 255.911791][ T6542] device sit0 left promiscuous mode [ 255.999807][ T6542] device sit0 entered promiscuous mode [ 256.920302][ T6577] FAULT_INJECTION: forcing a failure. [ 256.920302][ T6577] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 257.099722][ T6577] CPU: 1 PID: 6577 Comm: syz.3.2181 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 257.111030][ T6577] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 257.121079][ T6577] Call Trace: [ 257.124366][ T6577] __dump_stack+0x21/0x24 [ 257.128687][ T6577] dump_stack_lvl+0x169/0x1d8 [ 257.133354][ T6577] ? show_regs_print_info+0x18/0x18 [ 257.138539][ T6577] ? format_decode+0x1bb/0x1520 [ 257.143378][ T6577] dump_stack+0x15/0x1c [ 257.147530][ T6577] should_fail+0x3c1/0x510 [ 257.151931][ T6577] should_fail_usercopy+0x1a/0x20 [ 257.156942][ T6577] _copy_from_user+0x20/0xd0 [ 257.161523][ T6577] kstrtouint_from_user+0xbe/0x200 [ 257.166624][ T6577] ? kstrtol_from_user+0x260/0x260 [ 257.171723][ T6577] ? memset+0x35/0x40 [ 257.175694][ T6577] ? avc_policy_seqno+0x1b/0x70 [ 257.180534][ T6577] ? selinux_file_permission+0x2a5/0x510 [ 257.186155][ T6577] proc_fail_nth_write+0x85/0x1f0 [ 257.191164][ T6577] ? proc_fail_nth_read+0x210/0x210 [ 257.196351][ T6577] ? rw_verify_area+0x1c0/0x360 [ 257.201190][ T6577] ? proc_fail_nth_read+0x210/0x210 [ 257.206383][ T6577] vfs_write+0x32d/0xd60 [ 257.210615][ T6577] ? kernel_write+0x3c0/0x3c0 [ 257.215281][ T6577] ? security_file_free+0xc7/0xe0 [ 257.220292][ T6577] ? __kasan_check_write+0x14/0x20 [ 257.225399][ T6577] ? mutex_lock+0x8c/0xe0 [ 257.229716][ T6577] ? mutex_trylock+0xa0/0xa0 [ 257.234289][ T6577] ? __fget_files+0x2c4/0x320 [ 257.239038][ T6577] ? __fdget_pos+0x2d2/0x380 [ 257.243617][ T6577] ? ksys_write+0x71/0x240 [ 257.248018][ T6577] ksys_write+0x140/0x240 [ 257.252337][ T6577] ? __ia32_sys_read+0x90/0x90 [ 257.257088][ T6577] ? ____fput+0x15/0x20 [ 257.261234][ T6577] __x64_sys_write+0x7b/0x90 [ 257.265817][ T6577] do_syscall_64+0x31/0x40 [ 257.270229][ T6577] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 257.276104][ T6577] RIP: 0033:0x7f99862123df [ 257.280505][ T6577] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 257.300106][ T6577] RSP: 002b:00007f998487c030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 257.308511][ T6577] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f99862123df [ 257.316471][ T6577] RDX: 0000000000000001 RSI: 00007f998487c0a0 RDI: 0000000000000006 [ 257.324433][ T6577] RBP: 00007f998487c090 R08: 0000000000000000 R09: 0000000000000000 [ 257.332396][ T6577] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 257.340358][ T6577] R13: 0000000000000000 R14: 00007f998643afa0 R15: 00007fffe43112e8 [ 257.692553][ T6606] device sit0 left promiscuous mode [ 257.780025][ T6606] device sit0 entered promiscuous mode [ 258.394399][ T24] audit: type=1400 audit(1749586247.439:143): avc: denied { create } for pid=6623 comm="syz.3.2197" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmsvc_socket permissive=1 [ 258.873212][ T6641] device pim6reg1 entered promiscuous mode [ 259.267888][ T6651] device sit0 left promiscuous mode [ 259.397414][ T6651] device sit0 entered promiscuous mode [ 259.575566][ T6666] device sit0 left promiscuous mode [ 259.800395][ T6666] device sit0 entered promiscuous mode [ 260.030058][ T6685] FAULT_INJECTION: forcing a failure. [ 260.030058][ T6685] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 260.044107][ T6685] CPU: 1 PID: 6685 Comm: syz.1.2218 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 260.055395][ T6685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 260.065444][ T6685] Call Trace: [ 260.068735][ T6685] __dump_stack+0x21/0x24 [ 260.073067][ T6685] dump_stack_lvl+0x169/0x1d8 [ 260.077746][ T6685] ? show_regs_print_info+0x18/0x18 [ 260.082936][ T6685] dump_stack+0x15/0x1c [ 260.087087][ T6685] should_fail+0x3c1/0x510 [ 260.091493][ T6685] should_fail_usercopy+0x1a/0x20 [ 260.096496][ T6685] _copy_from_iter+0x1d1/0x9f0 [ 260.101236][ T6685] ? __kasan_check_read+0x11/0x20 [ 260.106233][ T6685] ? __check_object_size+0x2f4/0x3c0 [ 260.111490][ T6685] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 260.117183][ T6685] ? skb_put+0x10e/0x1f0 [ 260.121405][ T6685] tun_get_user+0x140a/0x3090 [ 260.126061][ T6685] ? tun_do_read+0x1c00/0x1c00 [ 260.130816][ T6685] ? kstrtouint_from_user+0x1a0/0x200 [ 260.136180][ T6685] ? __fsnotify_parent+0x5f5/0x6c0 [ 260.141273][ T6685] ? avc_policy_seqno+0x1b/0x70 [ 260.146104][ T6685] ? selinux_file_permission+0x2a5/0x510 [ 260.151713][ T6685] ? fsnotify_perm+0x66/0x4b0 [ 260.156499][ T6685] tun_chr_write_iter+0x1bf/0x270 [ 260.161499][ T6685] vfs_write+0x725/0xd60 [ 260.165715][ T6685] ? kernel_write+0x3c0/0x3c0 [ 260.170371][ T6685] ? __fget_files+0x2c4/0x320 [ 260.175022][ T6685] ? __fdget_pos+0x1f7/0x380 [ 260.179583][ T6685] ? ksys_write+0x71/0x240 [ 260.183975][ T6685] ksys_write+0x140/0x240 [ 260.188275][ T6685] ? __ia32_sys_read+0x90/0x90 [ 260.193015][ T6685] ? fpu__clear_all+0x20/0x20 [ 260.197667][ T6685] __x64_sys_write+0x7b/0x90 [ 260.202233][ T6685] do_syscall_64+0x31/0x40 [ 260.206628][ T6685] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 260.212493][ T6685] RIP: 0033:0x7ff6803df929 [ 260.216883][ T6685] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 260.236466][ T6685] RSP: 002b:00007ff67ea48038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 260.244853][ T6685] RAX: ffffffffffffffda RBX: 00007ff680606fa0 RCX: 00007ff6803df929 [ 260.252801][ T6685] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 260.260749][ T6685] RBP: 00007ff67ea48090 R08: 0000000000000000 R09: 0000000000000000 [ 260.268698][ T6685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 260.276648][ T6685] R13: 0000000000000000 R14: 00007ff680606fa0 R15: 00007ffe35a6e698 [ 260.874952][ T6719] device syzkaller0 entered promiscuous mode [ 264.272626][ T6807] FAULT_INJECTION: forcing a failure. [ 264.272626][ T6807] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 264.438689][ T6807] CPU: 1 PID: 6807 Comm: syz.3.2262 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 264.449990][ T6807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 264.460034][ T6807] Call Trace: [ 264.463315][ T6807] __dump_stack+0x21/0x24 [ 264.467635][ T6807] dump_stack_lvl+0x169/0x1d8 [ 264.472308][ T6807] ? show_regs_print_info+0x18/0x18 [ 264.477501][ T6807] dump_stack+0x15/0x1c [ 264.481655][ T6807] should_fail+0x3c1/0x510 [ 264.486063][ T6807] should_fail_usercopy+0x1a/0x20 [ 264.491099][ T6807] _copy_from_user+0x20/0xd0 [ 264.495668][ T6807] iovec_from_user+0x1bc/0x2f0 [ 264.500406][ T6807] ? kstrtouint_from_user+0x1a0/0x200 [ 264.505754][ T6807] __import_iovec+0x71/0x390 [ 264.510318][ T6807] ? memset+0x35/0x40 [ 264.514284][ T6807] import_iovec+0x7c/0xb0 [ 264.518601][ T6807] ___sys_recvmsg+0x420/0x4f0 [ 264.523254][ T6807] ? __sys_recvmsg+0x250/0x250 [ 264.527999][ T6807] ? __fdget+0x1a1/0x230 [ 264.532220][ T6807] __x64_sys_recvmsg+0x1dd/0x2a0 [ 264.537135][ T6807] ? fput+0x1a/0x20 [ 264.540924][ T6807] ? ___sys_recvmsg+0x4f0/0x4f0 [ 264.545759][ T6807] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 264.551803][ T6807] do_syscall_64+0x31/0x40 [ 264.556220][ T6807] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 264.562101][ T6807] RIP: 0033:0x7f9986213929 [ 264.566501][ T6807] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 264.586174][ T6807] RSP: 002b:00007f998487c038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 264.594665][ T6807] RAX: ffffffffffffffda RBX: 00007f998643afa0 RCX: 00007f9986213929 [ 264.602617][ T6807] RDX: 0000000000000000 RSI: 0000200000000b00 RDI: 0000000000000003 [ 264.610565][ T6807] RBP: 00007f998487c090 R08: 0000000000000000 R09: 0000000000000000 [ 264.618512][ T6807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 264.626596][ T6807] R13: 0000000000000000 R14: 00007f998643afa0 R15: 00007fffe43112e8 [ 267.430870][ T6862] device sit0 left promiscuous mode [ 268.568348][ T6881] device wg2 left promiscuous mode [ 268.583422][ T6882] device wg2 entered promiscuous mode [ 268.693419][ T6887] device pim6reg1 entered promiscuous mode [ 270.314834][ T6910] device sit0 left promiscuous mode [ 270.442813][ T6908] FAULT_INJECTION: forcing a failure. [ 270.442813][ T6908] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 270.506479][ T6911] device sit0 entered promiscuous mode [ 270.542635][ T6908] CPU: 0 PID: 6908 Comm: syz.2.2296 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 270.553936][ T6908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 270.563981][ T6908] Call Trace: [ 270.567272][ T6908] __dump_stack+0x21/0x24 [ 270.571697][ T6908] dump_stack_lvl+0x169/0x1d8 [ 270.576375][ T6908] ? show_regs_print_info+0x18/0x18 [ 270.581569][ T6908] dump_stack+0x15/0x1c [ 270.585713][ T6908] should_fail+0x3c1/0x510 [ 270.590120][ T6908] should_fail_alloc_page+0x4f/0x60 [ 270.595318][ T6908] __alloc_pages_nodemask+0x109/0x5f0 [ 270.600691][ T6908] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 270.606230][ T6908] ? __kmalloc+0x1a7/0x330 [ 270.610637][ T6908] ? __vmalloc_node_range+0x29f/0x780 [ 270.615993][ T6908] __vmalloc_node_range+0x353/0x780 [ 270.621202][ T6908] bpf_map_area_alloc+0xd5/0xe0 [ 270.626041][ T6908] ? stack_map_alloc+0x401/0x6b0 [ 270.630984][ T6908] stack_map_alloc+0x401/0x6b0 [ 270.635748][ T6908] ? bpf_stackmap_copy+0x250/0x250 [ 270.640855][ T6908] map_create+0x441/0x2190 [ 270.645256][ T6908] __se_sys_bpf+0x203/0x680 [ 270.649743][ T6908] ? __x64_sys_bpf+0x90/0x90 [ 270.654322][ T6908] ? debug_smp_processor_id+0x17/0x20 [ 270.659686][ T6908] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 270.665743][ T6908] __x64_sys_bpf+0x7b/0x90 [ 270.670149][ T6908] do_syscall_64+0x31/0x40 [ 270.674556][ T6908] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 270.680436][ T6908] RIP: 0033:0x7f51f6e25929 [ 270.684838][ T6908] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 270.704437][ T6908] RSP: 002b:00007f51f548e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 270.712843][ T6908] RAX: ffffffffffffffda RBX: 00007f51f704cfa0 RCX: 00007f51f6e25929 [ 270.720807][ T6908] RDX: 0000000000000048 RSI: 0000200000000240 RDI: 0000000000000000 [ 270.728769][ T6908] RBP: 00007f51f548e090 R08: 0000000000000000 R09: 0000000000000000 [ 270.736728][ T6908] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 270.744695][ T6908] R13: 0000000000000000 R14: 00007f51f704cfa0 R15: 00007ffde8b8a0e8 [ 271.530444][ T6931] syz.2.2302[6931] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.530527][ T6931] syz.2.2302[6931] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.948357][ T6942] device syzkaller0 entered promiscuous mode [ 273.141462][ T24] audit: type=1400 audit(1749586262.199:144): avc: denied { tracepoint } for pid=6982 comm="syz.4.2321" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 274.021100][ T7031] device sit0 left promiscuous mode [ 275.108098][ T7067] syz.4.2349[7067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.108148][ T7067] syz.4.2349[7067] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.907140][ T7085] device sit0 entered promiscuous mode [ 276.723738][ T7123] FAULT_INJECTION: forcing a failure. [ 276.723738][ T7123] name failslab, interval 1, probability 0, space 0, times 0 [ 276.860106][ T7123] CPU: 1 PID: 7123 Comm: syz.0.2369 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 276.871408][ T7123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 276.881452][ T7123] Call Trace: [ 276.884730][ T7123] __dump_stack+0x21/0x24 [ 276.889037][ T7123] dump_stack_lvl+0x169/0x1d8 [ 276.893704][ T7123] ? show_regs_print_info+0x18/0x18 [ 276.898882][ T7123] dump_stack+0x15/0x1c [ 276.903019][ T7123] should_fail+0x3c1/0x510 [ 276.907415][ T7123] ? prepare_creds+0x2c/0x5d0 [ 276.912080][ T7123] __should_failslab+0xa4/0xe0 [ 276.916833][ T7123] should_failslab+0x9/0x20 [ 276.921318][ T7123] kmem_cache_alloc+0x3d/0x2e0 [ 276.926060][ T7123] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 276.931497][ T7123] prepare_creds+0x2c/0x5d0 [ 276.935975][ T7123] ? copy_creds+0x7b/0x480 [ 276.940369][ T7123] copy_creds+0xe5/0x480 [ 276.944592][ T7123] copy_process+0x957/0x32c0 [ 276.949159][ T7123] ? memset+0x35/0x40 [ 276.953120][ T7123] ? proc_fail_nth_read+0x210/0x210 [ 276.958296][ T7123] ? __pidfd_prepare+0x150/0x150 [ 276.963212][ T7123] ? rw_verify_area+0x1c0/0x360 [ 276.968040][ T7123] ? vfs_write+0xac8/0xd60 [ 276.972438][ T7123] kernel_clone+0x23f/0x940 [ 276.976914][ T7123] ? kernel_write+0x3c0/0x3c0 [ 276.981567][ T7123] ? create_io_thread+0x130/0x130 [ 276.986567][ T7123] ? mutex_lock+0x8c/0xe0 [ 276.990874][ T7123] __x64_sys_clone+0x176/0x1d0 [ 276.995616][ T7123] ? __ia32_sys_vfork+0xf0/0xf0 [ 277.000444][ T7123] ? ksys_write+0x1eb/0x240 [ 277.004936][ T7123] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 277.010982][ T7123] do_syscall_64+0x31/0x40 [ 277.015386][ T7123] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 277.021254][ T7123] RIP: 0033:0x7ff02d866929 [ 277.025646][ T7123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 277.045227][ T7123] RSP: 002b:00007ff02becefe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 277.053616][ T7123] RAX: ffffffffffffffda RBX: 00007ff02da8dfa0 RCX: 00007ff02d866929 [ 277.061566][ T7123] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 277.069517][ T7123] RBP: 00007ff02becf090 R08: 0000000000000000 R09: 0000000000000000 [ 277.077478][ T7123] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 277.085433][ T7123] R13: 0000000000000000 R14: 00007ff02da8dfa0 R15: 00007ffd1763b248 [ 277.638430][ T7145] device sit0 left promiscuous mode [ 278.432932][ T7175] FAULT_INJECTION: forcing a failure. [ 278.432932][ T7175] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 278.473957][ T7175] CPU: 1 PID: 7175 Comm: syz.4.2384 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 278.485263][ T7175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 278.495436][ T7175] Call Trace: [ 278.498732][ T7175] __dump_stack+0x21/0x24 [ 278.503057][ T7175] dump_stack_lvl+0x169/0x1d8 [ 278.507755][ T7175] ? thaw_kernel_threads+0x220/0x220 [ 278.513050][ T7175] ? vsnprintf+0x1871/0x1960 [ 278.517641][ T7175] ? show_regs_print_info+0x18/0x18 [ 278.522835][ T7175] dump_stack+0x15/0x1c [ 278.526990][ T7175] should_fail+0x3c1/0x510 [ 278.531403][ T7175] should_fail_usercopy+0x1a/0x20 [ 278.536423][ T7175] _copy_to_user+0x20/0x90 [ 278.540832][ T7175] simple_read_from_buffer+0xe9/0x160 [ 278.546187][ T7175] proc_fail_nth_read+0x19a/0x210 [ 278.551195][ T7175] ? proc_fault_inject_write+0x2f0/0x2f0 [ 278.556812][ T7175] ? rw_verify_area+0x1c0/0x360 [ 278.561644][ T7175] ? proc_fault_inject_write+0x2f0/0x2f0 [ 278.567263][ T7175] vfs_read+0x1fe/0xa10 [ 278.571418][ T7175] ? kernel_read+0x70/0x70 [ 278.575819][ T7175] ? security_file_free+0xc7/0xe0 [ 278.580822][ T7175] ? __kasan_check_write+0x14/0x20 [ 278.585935][ T7175] ? mutex_lock+0x8c/0xe0 [ 278.590247][ T7175] ? mutex_trylock+0xa0/0xa0 [ 278.594813][ T7175] ? __fget_files+0x2c4/0x320 [ 278.599468][ T7175] ? __fdget_pos+0x2d2/0x380 [ 278.604034][ T7175] ? ksys_read+0x71/0x240 [ 278.608338][ T7175] ksys_read+0x140/0x240 [ 278.612557][ T7175] ? vfs_write+0xd60/0xd60 [ 278.616947][ T7175] ? ____fput+0x15/0x20 [ 278.621099][ T7175] __x64_sys_read+0x7b/0x90 [ 278.625593][ T7175] do_syscall_64+0x31/0x40 [ 278.629991][ T7175] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 278.635857][ T7175] RIP: 0033:0x7ff224d8f33c [ 278.640251][ T7175] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 278.659835][ T7175] RSP: 002b:00007ff2233f9030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 278.668228][ T7175] RAX: ffffffffffffffda RBX: 00007ff224fb7fa0 RCX: 00007ff224d8f33c [ 278.676179][ T7175] RDX: 000000000000000f RSI: 00007ff2233f90a0 RDI: 0000000000000008 [ 278.684128][ T7175] RBP: 00007ff2233f9090 R08: 0000000000000000 R09: 0000000000000000 [ 278.692077][ T7175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 278.700024][ T7175] R13: 0000000000000000 R14: 00007ff224fb7fa0 R15: 00007ffe687ebf78 [ 281.128840][ T7241] device syzkaller0 entered promiscuous mode [ 281.561401][ T7252] device pim6reg1 entered promiscuous mode [ 284.165057][ T7349] tap0: tun_chr_ioctl cmd 1074025675 [ 284.170544][ T7349] tap0: persist enabled [ 286.278460][ T7434] FAULT_INJECTION: forcing a failure. [ 286.278460][ T7434] name failslab, interval 1, probability 0, space 0, times 0 [ 286.440063][ T7434] CPU: 0 PID: 7434 Comm: syz.4.2473 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 286.451371][ T7434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 286.461422][ T7434] Call Trace: [ 286.464711][ T7434] __dump_stack+0x21/0x24 [ 286.469027][ T7434] dump_stack_lvl+0x169/0x1d8 [ 286.473694][ T7434] ? thaw_kernel_threads+0x220/0x220 [ 286.478968][ T7434] ? do_user_addr_fault+0x791/0xc80 [ 286.484169][ T7434] ? show_regs_print_info+0x18/0x18 [ 286.489376][ T7434] dump_stack+0x15/0x1c [ 286.493529][ T7434] should_fail+0x3c1/0x510 [ 286.497934][ T7434] ? sk_prot_alloc+0xb2/0x340 [ 286.502600][ T7434] __should_failslab+0xa4/0xe0 [ 286.507355][ T7434] should_failslab+0x9/0x20 [ 286.511849][ T7434] __kmalloc+0x60/0x330 [ 286.516000][ T7434] ? asm_exc_page_fault+0x1e/0x30 [ 286.521017][ T7434] sk_prot_alloc+0xb2/0x340 [ 286.525521][ T7434] sk_alloc+0x38/0x4e0 [ 286.529577][ T7434] ? bpf_ctx_init+0x173/0x1b0 [ 286.534255][ T7434] ? _copy_from_user+0x95/0xd0 [ 286.539015][ T7434] bpf_prog_test_run_skb+0x2fd/0x10b0 [ 286.544382][ T7434] ? __kasan_check_write+0x14/0x20 [ 286.549491][ T7434] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 286.555382][ T7434] bpf_prog_test_run+0x350/0x3c0 [ 286.560315][ T7434] __se_sys_bpf+0x49f/0x680 [ 286.564815][ T7434] ? __x64_sys_bpf+0x90/0x90 [ 286.569402][ T7434] ? fpu__clear_all+0x20/0x20 [ 286.574072][ T7434] __x64_sys_bpf+0x7b/0x90 [ 286.578484][ T7434] do_syscall_64+0x31/0x40 [ 286.582898][ T7434] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 286.588786][ T7434] RIP: 0033:0x7ff224d90929 [ 286.593192][ T7434] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 286.612797][ T7434] RSP: 002b:00007ff2233f9038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 286.621209][ T7434] RAX: ffffffffffffffda RBX: 00007ff224fb7fa0 RCX: 00007ff224d90929 [ 286.629177][ T7434] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 286.637147][ T7434] RBP: 00007ff2233f9090 R08: 0000000000000000 R09: 0000000000000000 [ 286.645119][ T7434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 286.653090][ T7434] R13: 0000000000000000 R14: 00007ff224fb7fa0 R15: 00007ffe687ebf78 [ 290.442203][ T7495] device wg2 left promiscuous mode [ 290.737431][ T7495] device wg2 entered promiscuous mode [ 301.212134][ T7677] device sit0 entered promiscuous mode [ 302.043413][ T7698] syz.0.2552[7698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 302.043497][ T7698] syz.0.2552[7698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 303.701374][ T7764] device sit0 left promiscuous mode [ 306.707303][ T7870] device sit0 left promiscuous mode [ 306.811233][ T7871] device sit0 entered promiscuous mode [ 308.416564][ T7908] device sit0 entered promiscuous mode [ 308.440324][ T7912] syz.2.2621[7912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 308.440408][ T7912] syz.2.2621[7912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.259702][ T7972] syz.4.2638[7972] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 310.270664][ T7973] device sit0 entered promiscuous mode [ 310.310820][ T7972] syz.4.2638[7972] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 311.523598][ T8015] device wg2 left promiscuous mode [ 312.104223][ T8018] device syzkaller0 entered promiscuous mode [ 312.322133][ T24] audit: type=1400 audit(1749586301.349:145): avc: denied { create } for pid=8025 comm="syz.0.2655" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 312.951923][ T8054] device veth0_vlan left promiscuous mode [ 313.093282][ T8054] device veth0_vlan entered promiscuous mode [ 313.203921][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 313.212299][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 313.220112][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 313.266609][ T8069] syz.2.2671[8069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.266684][ T8069] syz.2.2671[8069] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.971518][ T8107] syz.1.2687 (8107) used obsolete PPPIOCDETACH ioctl [ 316.364610][ T8157] FAULT_INJECTION: forcing a failure. [ 316.364610][ T8157] name failslab, interval 1, probability 0, space 0, times 0 [ 316.430261][ T8157] CPU: 0 PID: 8157 Comm: syz.2.2704 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 316.441568][ T8157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 316.451622][ T8157] Call Trace: [ 316.454912][ T8157] __dump_stack+0x21/0x24 [ 316.459228][ T8157] dump_stack_lvl+0x169/0x1d8 [ 316.463893][ T8157] ? thaw_kernel_threads+0x220/0x220 [ 316.469169][ T8157] ? show_regs_print_info+0x18/0x18 [ 316.474358][ T8157] dump_stack+0x15/0x1c [ 316.478503][ T8157] should_fail+0x3c1/0x510 [ 316.482909][ T8157] ? __alloc_skb+0x9e/0x520 [ 316.487401][ T8157] __should_failslab+0xa4/0xe0 [ 316.492150][ T8157] should_failslab+0x9/0x20 [ 316.496645][ T8157] kmem_cache_alloc+0x3d/0x2e0 [ 316.501400][ T8157] __alloc_skb+0x9e/0x520 [ 316.505717][ T8157] alloc_skb_with_frags+0xa2/0x560 [ 316.510816][ T8157] sock_alloc_send_pskb+0x853/0x980 [ 316.516000][ T8157] ? is_bpf_text_address+0x177/0x190 [ 316.521270][ T8157] ? __kernel_text_address+0xa0/0x100 [ 316.526630][ T8157] ? sock_kzfree_s+0x60/0x60 [ 316.531209][ T8157] ? stack_trace_save+0x98/0xe0 [ 316.536049][ T8157] tun_get_user+0x4bd/0x3090 [ 316.540626][ T8157] ? __x64_sys_openat+0x136/0x160 [ 316.545636][ T8157] ? tun_do_read+0x1c00/0x1c00 [ 316.550387][ T8157] ? kstrtouint_from_user+0x1a0/0x200 [ 316.555746][ T8157] ? __fsnotify_parent+0x5f5/0x6c0 [ 316.560842][ T8157] ? avc_policy_seqno+0x1b/0x70 [ 316.565813][ T8157] ? selinux_file_permission+0x2a5/0x510 [ 316.571523][ T8157] ? fsnotify_perm+0x66/0x4b0 [ 316.576197][ T8157] tun_chr_write_iter+0x1bf/0x270 [ 316.581222][ T8157] vfs_write+0x725/0xd60 [ 316.585463][ T8157] ? __kasan_slab_free+0x11/0x20 [ 316.590392][ T8157] ? kernel_write+0x3c0/0x3c0 [ 316.595061][ T8157] ? __fget_files+0x2c4/0x320 [ 316.599727][ T8157] ? __fdget_pos+0x1f7/0x380 [ 316.604302][ T8157] ? ksys_write+0x71/0x240 [ 316.608706][ T8157] ksys_write+0x140/0x240 [ 316.613023][ T8157] ? __ia32_sys_read+0x90/0x90 [ 316.617775][ T8157] ? fpu__clear_all+0x20/0x20 [ 316.622438][ T8157] __x64_sys_write+0x7b/0x90 [ 316.627017][ T8157] do_syscall_64+0x31/0x40 [ 316.631421][ T8157] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 316.637311][ T8157] RIP: 0033:0x7f51f6e25929 [ 316.641719][ T8157] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 316.661314][ T8157] RSP: 002b:00007f51f548e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 316.669718][ T8157] RAX: ffffffffffffffda RBX: 00007f51f704cfa0 RCX: 00007f51f6e25929 [ 316.677677][ T8157] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 316.685636][ T8157] RBP: 00007f51f548e090 R08: 0000000000000000 R09: 0000000000000000 [ 316.693593][ T8157] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 316.701554][ T8157] R13: 0000000000000000 R14: 00007f51f704cfa0 R15: 00007ffde8b8a0e8 [ 317.541943][ T8180] device veth0_vlan left promiscuous mode [ 317.548340][ T8180] device veth0_vlan entered promiscuous mode [ 317.555266][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 317.563392][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 317.571185][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 321.980964][ T8275] syz.2.2740[8275] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.981013][ T8275] syz.2.2740[8275] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 324.886308][ T8333] device wg2 left promiscuous mode [ 325.149765][ T8333] device wg2 entered promiscuous mode [ 332.672711][ T8457] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.680044][ T8457] bridge0: port 1(bridge_slave_0) entered disabled state [ 332.687489][ T8457] device bridge_slave_0 entered promiscuous mode [ 332.694524][ T8457] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.701568][ T8457] bridge0: port 2(bridge_slave_1) entered disabled state [ 332.709273][ T8457] device bridge_slave_1 entered promiscuous mode [ 333.288462][ T24] audit: type=1400 audit(1749586322.339:146): avc: denied { write } for pid=8457 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 333.360351][ T24] audit: type=1400 audit(1749586322.339:147): avc: denied { read } for pid=8457 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 333.412601][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 333.464476][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 333.654740][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 333.782268][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 333.847243][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 333.854315][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 333.862046][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 333.870561][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 333.878750][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 333.885815][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 333.908338][ T8457] device veth0_vlan entered promiscuous mode [ 333.914956][ T8477] device sit0 left promiscuous mode [ 333.925664][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 333.939898][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 333.949137][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 333.956901][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 333.964757][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 333.973098][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 333.981288][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 334.011994][ T8477] device sit0 entered promiscuous mode [ 334.489986][ T8494] syz.1.2814[8494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.490078][ T8494] syz.1.2814[8494] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 334.716512][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 334.848138][ T8457] device veth1_macvtap entered promiscuous mode [ 334.968537][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 334.997110][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 335.107516][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 335.118151][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 335.511767][ T8516] device syzkaller0 entered promiscuous mode [ 335.652140][ T414] device veth0 left promiscuous mode [ 335.657528][ T414] bridge0: port 3(veth0) entered disabled state [ 335.806149][ T414] device bridge_slave_1 left promiscuous mode [ 335.837251][ T414] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.928759][ T414] device bridge_slave_0 left promiscuous mode [ 335.964689][ T414] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.975757][ T414] device veth1_macvtap left promiscuous mode [ 336.402819][ T8544] device wg2 entered promiscuous mode [ 338.528770][ T8612] device sit0 entered promiscuous mode [ 338.752099][ T8603] bridge0: port 1(bridge_slave_0) entered blocking state [ 338.759142][ T8603] bridge0: port 1(bridge_slave_0) entered disabled state [ 338.903756][ T8603] device bridge_slave_0 entered promiscuous mode [ 339.111428][ T8603] bridge0: port 2(bridge_slave_1) entered blocking state [ 339.118524][ T8603] bridge0: port 2(bridge_slave_1) entered disabled state [ 339.127146][ T8603] device bridge_slave_1 entered promiscuous mode [ 339.698248][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 339.716226][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 339.911837][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 339.920835][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 339.932368][ T414] bridge0: port 1(bridge_slave_0) entered blocking state [ 339.939468][ T414] bridge0: port 1(bridge_slave_0) entered forwarding state [ 339.955979][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 339.996871][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 340.005603][ T414] bridge0: port 2(bridge_slave_1) entered blocking state [ 340.012674][ T414] bridge0: port 2(bridge_slave_1) entered forwarding state [ 340.026001][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 340.204465][ T8652] device syzkaller0 entered promiscuous mode [ 340.794692][ T296] device veth0 left promiscuous mode [ 340.800095][ T296] bridge0: port 3(veth0) entered disabled state [ 340.878425][ T296] device bridge_slave_1 left promiscuous mode [ 340.884619][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 340.892837][ T296] device bridge_slave_0 left promiscuous mode [ 340.899343][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 340.912459][ T296] device veth1_macvtap left promiscuous mode [ 341.151985][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 341.159966][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 341.172966][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 341.181502][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 341.333330][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 341.363434][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 341.411326][ T8675] device sit0 left promiscuous mode [ 341.420366][ T8603] device veth0_vlan entered promiscuous mode [ 341.433193][ T8603] device veth1_macvtap entered promiscuous mode [ 341.475593][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 341.490013][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 341.497591][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 341.506121][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 341.514551][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 341.534226][ T8675] device sit0 entered promiscuous mode [ 341.607118][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 341.619320][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 341.628111][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 341.636741][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 342.318618][ T8696] FAULT_INJECTION: forcing a failure. [ 342.318618][ T8696] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 342.334581][ T8696] CPU: 1 PID: 8696 Comm: syz.1.2878 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 342.345864][ T8696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 342.355914][ T8696] Call Trace: [ 342.359216][ T8696] __dump_stack+0x21/0x24 [ 342.363538][ T8696] dump_stack_lvl+0x169/0x1d8 [ 342.368212][ T8696] ? show_regs_print_info+0x18/0x18 [ 342.373407][ T8696] ? kvm_sched_clock_read+0x18/0x40 [ 342.378593][ T8696] ? sched_clock+0x3a/0x40 [ 342.382996][ T8696] ? sched_clock_cpu+0x1b/0x3d0 [ 342.387838][ T8696] ? sched_clock+0x3a/0x40 [ 342.392248][ T8696] dump_stack+0x15/0x1c [ 342.396405][ T8696] should_fail+0x3c1/0x510 [ 342.400822][ T8696] should_fail_alloc_page+0x4f/0x60 [ 342.406016][ T8696] __alloc_pages_nodemask+0x109/0x5f0 [ 342.411383][ T8696] ? irq_exit_rcu+0x9/0x10 [ 342.415794][ T8696] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 342.421596][ T8696] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 342.427136][ T8696] ? kasan_check_range+0x1ae/0x290 [ 342.432246][ T8696] shmem_alloc_page+0x1b1/0x300 [ 342.437086][ T8696] ? put_page+0xd0/0xd0 [ 342.441244][ T8696] ? percpu_counter_add_batch+0x13c/0x160 [ 342.446961][ T8696] shmem_alloc_and_acct_page+0x36f/0x7b0 [ 342.452593][ T8696] ? shmem_swapin_page+0x16c0/0x16c0 [ 342.457870][ T8696] ? sched_clock+0x3a/0x40 [ 342.462276][ T8696] ? sched_clock_cpu+0x1b/0x3d0 [ 342.467117][ T8696] ? sched_clock+0x3a/0x40 [ 342.471526][ T8696] ? sched_clock_cpu+0x1b/0x3d0 [ 342.476371][ T8696] ? __irq_exit_rcu+0x40/0x150 [ 342.481131][ T8696] ? irq_exit_rcu+0x9/0x10 [ 342.485542][ T8696] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 342.491339][ T8696] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 342.497494][ T8696] shmem_getpage_gfp+0x625/0x2110 [ 342.502510][ T8696] shmem_write_begin+0xce/0x1b0 [ 342.507340][ T8696] generic_perform_write+0x2be/0x510 [ 342.512599][ T8696] ? preempt_count_add+0x90/0x1b0 [ 342.517598][ T8696] ? grab_cache_page_write_begin+0xb0/0xb0 [ 342.523379][ T8696] ? file_remove_privs+0x580/0x580 [ 342.528474][ T8696] ? __kasan_check_write+0x14/0x20 [ 342.533562][ T8696] ? down_write+0xac/0x110 [ 342.537957][ T8696] __generic_file_write_iter+0x24b/0x480 [ 342.543575][ T8696] ? generic_write_checks+0x3d4/0x480 [ 342.548937][ T8696] generic_file_write_iter+0xa9/0x1d0 [ 342.554299][ T8696] vfs_write+0x725/0xd60 [ 342.558533][ T8696] ? __bpf_trace_kmem_free+0x6f/0x90 [ 342.563825][ T8696] ? kernel_write+0x3c0/0x3c0 [ 342.568499][ T8696] ? mutex_trylock+0xa0/0xa0 [ 342.573083][ T8696] ? __fget_files+0x2c4/0x320 [ 342.577756][ T8696] ? __fdget_pos+0x2d2/0x380 [ 342.582331][ T8696] ? ksys_write+0x71/0x240 [ 342.586734][ T8696] ksys_write+0x140/0x240 [ 342.591058][ T8696] ? __ia32_sys_read+0x90/0x90 [ 342.595830][ T8696] ? fpu__clear_all+0x20/0x20 [ 342.600519][ T8696] __x64_sys_write+0x7b/0x90 [ 342.605114][ T8696] do_syscall_64+0x31/0x40 [ 342.609529][ T8696] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 342.615408][ T8696] RIP: 0033:0x7ff6803df929 [ 342.619812][ T8696] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 342.639409][ T8696] RSP: 002b:00007ff67ea48038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 342.647815][ T8696] RAX: ffffffffffffffda RBX: 00007ff680606fa0 RCX: 00007ff6803df929 [ 342.655773][ T8696] RDX: 00000000002a979d RSI: 0000200000000000 RDI: 0000000000000005 [ 342.663732][ T8696] RBP: 00007ff67ea48090 R08: 0000000000000000 R09: 0000000000000000 [ 342.671690][ T8696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 342.679651][ T8696] R13: 0000000000000000 R14: 00007ff680606fa0 R15: 00007ffe35a6e698 [ 343.711944][ T8726] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 346.081025][ T8775] device pim6reg1 entered promiscuous mode [ 354.769935][ T8984] device sit0 left promiscuous mode [ 354.908605][ T8987] device sit0 entered promiscuous mode [ 355.836943][ T9001] device wg2 left promiscuous mode [ 357.991108][ T9066] FAULT_INJECTION: forcing a failure. [ 357.991108][ T9066] name failslab, interval 1, probability 0, space 0, times 0 [ 358.003772][ T9066] CPU: 1 PID: 9066 Comm: syz.2.3003 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 358.015046][ T9066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 358.025093][ T9066] Call Trace: [ 358.028371][ T9066] __dump_stack+0x21/0x24 [ 358.032679][ T9066] dump_stack_lvl+0x169/0x1d8 [ 358.037333][ T9066] ? thaw_kernel_threads+0x220/0x220 [ 358.042597][ T9066] ? _raw_spin_lock+0x8e/0xe0 [ 358.047249][ T9066] ? show_regs_print_info+0x18/0x18 [ 358.052433][ T9066] dump_stack+0x15/0x1c [ 358.056569][ T9066] should_fail+0x3c1/0x510 [ 358.060964][ T9066] ? ___neigh_create+0x6f0/0x1a20 [ 358.065965][ T9066] __should_failslab+0xa4/0xe0 [ 358.070710][ T9066] should_failslab+0x9/0x20 [ 358.075190][ T9066] __kmalloc+0x60/0x330 [ 358.079325][ T9066] ? alloc_skb_with_frags+0xa2/0x560 [ 358.084590][ T9066] ___neigh_create+0x6f0/0x1a20 [ 358.089426][ T9066] ? __kasan_check_read+0x11/0x20 [ 358.094438][ T9066] ? selinux_ip_postroute+0x252/0xe00 [ 358.099793][ T9066] __neigh_create+0x31/0x40 [ 358.104273][ T9066] ip6_finish_output2+0x8d1/0x1500 [ 358.109371][ T9066] ? __ip6_finish_output+0x790/0x790 [ 358.114631][ T9066] ? ip6t_do_table+0x1348/0x14e0 [ 358.119553][ T9066] ? ip6table_mangle_hook+0x2c4/0x730 [ 358.124906][ T9066] __ip6_finish_output+0x5ff/0x790 [ 358.129999][ T9066] ip6_finish_output+0x33/0x1f0 [ 358.134826][ T9066] ip6_output+0x1d1/0x3b0 [ 358.139137][ T9066] ? ip6table_mangle_hook+0x48f/0x730 [ 358.144490][ T9066] ? ac6_seq_show+0xf0/0xf0 [ 358.148971][ T9066] ? ip6_output+0x3b0/0x3b0 [ 358.153449][ T9066] ? ip6table_filter_table_init+0xf0/0xf0 [ 358.159145][ T9066] ip6_local_out+0x21a/0x3d0 [ 358.163713][ T9066] ? dst_output+0x80/0x80 [ 358.168022][ T9066] ? __ip6_local_out+0x360/0x360 [ 358.172944][ T9066] ip6_push_pending_frames+0x142/0x280 [ 358.178382][ T9066] icmpv6_push_pending_frames+0x29f/0x440 [ 358.184083][ T9066] icmp6_send+0x10f5/0x15c0 [ 358.188567][ T9066] ? icmpv6_push_pending_frames+0x440/0x440 [ 358.194441][ T9066] ? slab_post_alloc_hook+0x7d/0x2f0 [ 358.199706][ T9066] ? xfrm_pols_put+0x196/0x1c0 [ 358.204449][ T9066] ? rt_cache_route+0x290/0x320 [ 358.209276][ T9066] icmpv6_ndo_send+0x13f/0x4c0 [ 358.214018][ T9066] ? ip_route_output_key_hash_rcu+0x14b8/0x2060 [ 358.220236][ T9066] ? udp6_set_csum+0x5f0/0x5f0 [ 358.224977][ T9066] ? ip_route_output_flow+0x1d2/0x2d0 [ 358.230325][ T9066] ? ipv4_sk_update_pmtu+0x1320/0x1320 [ 358.235763][ T9066] tnl_update_pmtu+0x7e2/0xbc0 [ 358.240506][ T9066] ip_tunnel_xmit+0xecc/0x2280 [ 358.245248][ T9066] ? tnl_update_pmtu+0xbc0/0xbc0 [ 358.250164][ T9066] ? skb_network_protocol+0x5b8/0x770 [ 358.255514][ T9066] ? gre_build_header+0x229/0x790 [ 358.260515][ T9066] ipgre_xmit+0x7c0/0xb30 [ 358.264824][ T9066] dev_hard_start_xmit+0x244/0x670 [ 358.269917][ T9066] __dev_queue_xmit+0x1446/0x2540 [ 358.274918][ T9066] ? dev_queue_xmit+0x20/0x20 [ 358.279575][ T9066] ? __kasan_check_write+0x14/0x20 [ 358.284665][ T9066] ? skb_release_data+0x3b3/0x670 [ 358.289666][ T9066] ? skb_ensure_writable+0x2e7/0x460 [ 358.294929][ T9066] ? __kasan_check_write+0x14/0x20 [ 358.300019][ T9066] ? pskb_expand_head+0xb28/0x1110 [ 358.305109][ T9066] dev_queue_xmit+0x17/0x20 [ 358.309593][ T9066] __bpf_redirect+0x699/0xe30 [ 358.314247][ T9066] bpf_clone_redirect+0x242/0x380 [ 358.319249][ T9066] bpf_prog_e2f29814702bf05a+0x56/0xce4 [ 358.324775][ T9066] ? sk_get_meminfo+0x240/0x490 [ 358.329602][ T9066] ? bpf_prog_test_run_skb+0x31d/0x10b0 [ 358.335124][ T9066] ? bpf_prog_test_run+0x350/0x3c0 [ 358.340210][ T9066] ? __se_sys_bpf+0x49f/0x680 [ 358.344859][ T9066] ? __x64_sys_bpf+0x7b/0x90 [ 358.349426][ T9066] ? do_syscall_64+0x31/0x40 [ 358.353995][ T9066] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 358.360047][ T9066] ? ktime_get+0x10e/0x140 [ 358.364444][ T9066] bpf_test_run+0x310/0x9b0 [ 358.368928][ T9066] ? convert___skb_to_skb+0x4f0/0x4f0 [ 358.374282][ T9066] ? eth_get_headlen+0x1f0/0x1f0 [ 358.379198][ T9066] ? convert___skb_to_skb+0x41/0x4f0 [ 358.384460][ T9066] bpf_prog_test_run_skb+0x9c2/0x10b0 [ 358.389813][ T9066] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 358.395686][ T9066] bpf_prog_test_run+0x350/0x3c0 [ 358.400601][ T9066] __se_sys_bpf+0x49f/0x680 [ 358.405082][ T9066] ? __x64_sys_bpf+0x90/0x90 [ 358.409657][ T9066] ? fpu__clear_all+0x20/0x20 [ 358.414313][ T9066] __x64_sys_bpf+0x7b/0x90 [ 358.418708][ T9066] do_syscall_64+0x31/0x40 [ 358.423105][ T9066] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 358.428974][ T9066] RIP: 0033:0x7fb3d862e929 [ 358.433376][ T9066] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 358.452959][ T9066] RSP: 002b:00007fb3d6c97038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 358.461350][ T9066] RAX: ffffffffffffffda RBX: 00007fb3d8855fa0 RCX: 00007fb3d862e929 [ 358.469307][ T9066] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 358.477257][ T9066] RBP: 00007fb3d6c97090 R08: 0000000000000000 R09: 0000000000000000 [ 358.485211][ T9066] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 358.493164][ T9066] R13: 0000000000000000 R14: 00007fb3d8855fa0 R15: 00007ffeaa2b77f8 [ 358.566639][ T9071] device wg2 left promiscuous mode [ 358.771262][ T9080] device sit0 left promiscuous mode [ 358.798642][ T9080] device sit0 entered promiscuous mode [ 360.385911][ T9134] device sit0 left promiscuous mode [ 360.449719][ T9137] device sit0 entered promiscuous mode [ 360.966832][ T9173] syz.0.3040[9173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 360.966914][ T9173] syz.0.3040[9173] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 362.000816][ T9212] device pim6reg1 entered promiscuous mode [ 362.031256][ T24] audit: type=1400 audit(1749586351.089:148): avc: denied { create } for pid=9214 comm="syz.4.3054" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 363.726121][ T24] audit: type=1400 audit(1749586352.779:149): avc: denied { create } for pid=9257 comm="syz.0.3068" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 364.981581][ T9287] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.997779][ T9287] bridge0: port 1(bridge_slave_0) entered disabled state [ 365.230126][ T9287] device bridge_slave_1 left promiscuous mode [ 365.242074][ T9287] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.295488][ T9287] device bridge_slave_0 left promiscuous mode [ 365.307340][ T9287] bridge0: port 1(bridge_slave_0) entered disabled state [ 365.688407][ T9292] bridge0: port 1(bridge_slave_0) entered blocking state [ 365.709877][ T9292] bridge0: port 1(bridge_slave_0) entered disabled state [ 365.730215][ T9292] device bridge_slave_0 entered promiscuous mode [ 365.763239][ T9292] bridge0: port 2(bridge_slave_1) entered blocking state [ 365.801746][ T9292] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.809055][ T9292] device bridge_slave_1 entered promiscuous mode [ 365.992527][ T9292] bridge0: port 2(bridge_slave_1) entered blocking state [ 365.999661][ T9292] bridge0: port 2(bridge_slave_1) entered forwarding state [ 366.007302][ T9292] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.014375][ T9292] bridge0: port 1(bridge_slave_0) entered forwarding state [ 366.148622][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 366.160065][ T414] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.180037][ T414] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.209343][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 366.221137][ T414] bridge0: port 1(bridge_slave_0) entered blocking state [ 366.228244][ T414] bridge0: port 1(bridge_slave_0) entered forwarding state [ 366.238009][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 366.246746][ T414] bridge0: port 2(bridge_slave_1) entered blocking state [ 366.253823][ T414] bridge0: port 2(bridge_slave_1) entered forwarding state [ 366.261871][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 366.299644][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 366.307985][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 366.316308][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 366.326124][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 366.336489][ T9292] device veth0_vlan entered promiscuous mode [ 366.352882][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 366.361072][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 366.400272][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 366.410235][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 366.433518][ T9292] device veth1_macvtap entered promiscuous mode [ 366.440476][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 366.449032][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 366.458677][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 366.478323][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 366.486878][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 366.495636][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 366.505097][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 366.562611][ T296] device veth1 left promiscuous mode [ 366.568114][ T296] kfree: port 1(veth1) entered disabled state [ 366.782419][ T9341] device sit0 entered promiscuous mode [ 367.296288][ T9349] device syzkaller0 entered promiscuous mode [ 368.186800][ T9381] device sit0 entered promiscuous mode [ 368.985813][ T9368] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.006205][ T9368] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.013764][ T9368] device bridge_slave_0 entered promiscuous mode [ 369.025154][ T9368] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.032399][ T9368] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.040085][ T9368] device bridge_slave_1 entered promiscuous mode [ 369.096830][ T9368] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.103921][ T9368] bridge0: port 2(bridge_slave_1) entered forwarding state [ 369.111189][ T9368] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.118208][ T9368] bridge0: port 1(bridge_slave_0) entered forwarding state [ 369.284678][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 369.299919][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 369.332139][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 369.359545][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 369.770716][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 369.783401][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.790505][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 369.805612][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 369.822639][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.829734][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 369.843606][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 369.860446][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 369.886114][ T9368] device veth0_vlan entered promiscuous mode [ 369.912856][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 369.935762][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 370.022672][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 370.030227][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 370.044021][ T9368] device veth1_macvtap entered promiscuous mode [ 370.113395][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 370.129928][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 370.146800][ T9435] syz.0.3128[9435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 370.146878][ T9435] syz.0.3128[9435] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 370.148402][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 370.180430][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 370.188811][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 370.380191][ T296] device veth0 left promiscuous mode [ 370.385807][ T296] bridge0: port 3(veth0) entered disabled state [ 370.440659][ T296] device bridge_slave_1 left promiscuous mode [ 370.503162][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 370.584986][ T296] device bridge_slave_0 left promiscuous mode [ 370.653478][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.652816][ T9465] ÿ: renamed from bond_slave_0 [ 371.772507][ T9454] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.779568][ T9454] bridge0: port 1(bridge_slave_0) entered disabled state [ 371.787324][ T9454] device bridge_slave_0 entered promiscuous mode [ 371.794895][ T9454] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.802377][ T9454] bridge0: port 2(bridge_slave_1) entered disabled state [ 371.810327][ T9454] device bridge_slave_1 entered promiscuous mode [ 371.856054][ T9454] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.863162][ T9454] bridge0: port 2(bridge_slave_1) entered forwarding state [ 371.870445][ T9454] bridge0: port 1(bridge_slave_0) entered blocking state [ 371.877472][ T9454] bridge0: port 1(bridge_slave_0) entered forwarding state [ 372.048901][ T9484] device sit0 left promiscuous mode [ 372.064604][ T9486] device sit0 left promiscuous mode [ 372.090522][ T414] bridge0: port 1(bridge_slave_0) entered disabled state [ 372.113378][ T414] bridge0: port 2(bridge_slave_1) entered disabled state [ 372.121807][ T9487] device sit0 entered promiscuous mode [ 372.145370][ T9486] device sit0 entered promiscuous mode [ 372.710305][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 372.738581][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 372.851974][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 372.960688][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 373.059524][ T414] bridge0: port 1(bridge_slave_0) entered blocking state [ 373.066625][ T414] bridge0: port 1(bridge_slave_0) entered forwarding state [ 373.090473][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 373.098972][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 373.107436][ T414] bridge0: port 2(bridge_slave_1) entered blocking state [ 373.114523][ T414] bridge0: port 2(bridge_slave_1) entered forwarding state [ 373.198052][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 373.260063][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 373.327122][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 373.429491][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 373.605044][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 373.683428][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 373.703167][ T9454] device veth0_vlan entered promiscuous mode [ 373.716163][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 373.880211][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 374.049926][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 374.377914][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 374.456254][ T9454] device veth1_macvtap entered promiscuous mode [ 374.516461][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 374.577597][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 374.692127][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 374.949154][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 374.987392][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 375.117715][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 375.250306][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 375.358018][ T9531] device sit0 entered promiscuous mode [ 375.406946][ T9535] FAULT_INJECTION: forcing a failure. [ 375.406946][ T9535] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 375.420132][ T9535] CPU: 1 PID: 9535 Comm: syz.3.3158 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 375.431402][ T9535] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 375.441446][ T9535] Call Trace: [ 375.444734][ T9535] __dump_stack+0x21/0x24 [ 375.449060][ T9535] dump_stack_lvl+0x169/0x1d8 [ 375.453733][ T9535] ? thaw_kernel_threads+0x220/0x220 [ 375.459016][ T9535] ? show_regs_print_info+0x18/0x18 [ 375.464215][ T9535] dump_stack+0x15/0x1c [ 375.468372][ T9535] should_fail+0x3c1/0x510 [ 375.472781][ T9535] should_fail_usercopy+0x1a/0x20 [ 375.477793][ T9535] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 375.483861][ T9535] generic_perform_write+0x326/0x510 [ 375.489217][ T9535] ? grab_cache_page_write_begin+0xb0/0xb0 [ 375.495021][ T9535] __generic_file_write_iter+0x24b/0x480 [ 375.500647][ T9535] ? generic_write_checks+0x3d4/0x480 [ 375.506014][ T9535] generic_file_write_iter+0xa9/0x1d0 [ 375.511378][ T9535] vfs_write+0x725/0xd60 [ 375.515611][ T9535] ? kernel_write+0x3c0/0x3c0 [ 375.520277][ T9535] ? irq_exit_rcu+0x9/0x10 [ 375.524683][ T9535] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 375.530830][ T9535] ? vfs_write+0x6/0xd60 [ 375.535064][ T9535] ksys_write+0x140/0x240 [ 375.539386][ T9535] ? __ia32_sys_read+0x90/0x90 [ 375.544141][ T9535] ? debug_smp_processor_id+0x17/0x20 [ 375.549507][ T9535] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 375.555567][ T9535] __x64_sys_write+0x7b/0x90 [ 375.560146][ T9535] do_syscall_64+0x31/0x40 [ 375.564556][ T9535] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 375.570441][ T9535] RIP: 0033:0x7f882ff09929 [ 375.574853][ T9535] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 375.594545][ T9535] RSP: 002b:00007f882e572038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 375.602955][ T9535] RAX: ffffffffffffffda RBX: 00007f8830130fa0 RCX: 00007f882ff09929 [ 375.610920][ T9535] RDX: 00000000002a979d RSI: 0000200000000000 RDI: 0000000000000005 [ 375.618984][ T9535] RBP: 00007f882e572090 R08: 0000000000000000 R09: 0000000000000000 [ 375.626957][ T9535] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 375.634922][ T9535] R13: 0000000000000000 R14: 00007f8830130fa0 R15: 00007fff0aea2778 [ 375.913237][ T296] device erspan0 left promiscuous mode [ 375.923756][ T296] GPL: port 1(erspan0) entered disabled state [ 376.614490][ T9553] device sit0 left promiscuous mode [ 376.735680][ T9556] device sit0 entered promiscuous mode [ 376.974822][ T296] device veth0 left promiscuous mode [ 376.995645][ T296] bridge0: port 3(veth0) entered disabled state [ 377.061770][ T296] device bridge_slave_1 left promiscuous mode [ 377.120198][ T296] bridge0: port 2(bridge_slave_1) entered disabled state [ 377.185983][ T296] device bridge_slave_0 left promiscuous mode [ 377.244863][ T296] bridge0: port 1(bridge_slave_0) entered disabled state [ 377.326112][ T296] device veth1_macvtap left promiscuous mode [ 378.390963][ T9619] FAULT_INJECTION: forcing a failure. [ 378.390963][ T9619] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 378.421717][ T9619] CPU: 0 PID: 9619 Comm: syz.1.3184 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 378.433027][ T9619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 378.443078][ T9619] Call Trace: [ 378.446367][ T9619] __dump_stack+0x21/0x24 [ 378.450691][ T9619] dump_stack_lvl+0x169/0x1d8 [ 378.455367][ T9619] ? show_regs_print_info+0x18/0x18 [ 378.460564][ T9619] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 378.466372][ T9619] dump_stack+0x15/0x1c [ 378.470534][ T9619] should_fail+0x3c1/0x510 [ 378.474945][ T9619] should_fail_usercopy+0x1a/0x20 [ 378.479961][ T9619] _copy_to_user+0x20/0x90 [ 378.484372][ T9619] map_lookup_and_delete_elem+0x409/0x530 [ 378.490081][ T9619] __se_sys_bpf+0x454/0x680 [ 378.494570][ T9619] ? __x64_sys_bpf+0x90/0x90 [ 378.499152][ T9619] ? fpu__clear_all+0x20/0x20 [ 378.503819][ T9619] __x64_sys_bpf+0x7b/0x90 [ 378.508228][ T9619] do_syscall_64+0x31/0x40 [ 378.512638][ T9619] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 378.518520][ T9619] RIP: 0033:0x7f56bea8e929 [ 378.522924][ T9619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 378.542533][ T9619] RSP: 002b:00007f56bd0f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 378.550947][ T9619] RAX: ffffffffffffffda RBX: 00007f56becb5fa0 RCX: 00007f56bea8e929 [ 378.558909][ T9619] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000015 [ 378.566869][ T9619] RBP: 00007f56bd0f7090 R08: 0000000000000000 R09: 0000000000000000 [ 378.574827][ T9619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 378.582800][ T9619] R13: 0000000000000000 R14: 00007f56becb5fa0 R15: 00007ffe3fa80c38 [ 379.247795][ T9671] device pim6reg1 entered promiscuous mode [ 379.628274][ T9690] ÿ: renamed from bond_slave_0 [ 379.640066][ T9690] FAULT_INJECTION: forcing a failure. [ 379.640066][ T9690] name failslab, interval 1, probability 0, space 0, times 0 [ 379.653167][ T9690] CPU: 1 PID: 9690 Comm: syz.4.3204 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 379.664448][ T9690] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 379.674493][ T9690] Call Trace: [ 379.677787][ T9690] __dump_stack+0x21/0x24 [ 379.682104][ T9690] dump_stack_lvl+0x169/0x1d8 [ 379.686783][ T9690] ? thaw_kernel_threads+0x220/0x220 [ 379.692052][ T9690] ? show_regs_print_info+0x18/0x18 [ 379.697228][ T9690] ? __kernel_text_address+0xa0/0x100 [ 379.702578][ T9690] dump_stack+0x15/0x1c [ 379.706716][ T9690] should_fail+0x3c1/0x510 [ 379.711109][ T9690] ? device_rename+0xaa/0x190 [ 379.715764][ T9690] __should_failslab+0xa4/0xe0 [ 379.720506][ T9690] should_failslab+0x9/0x20 [ 379.724987][ T9690] __kmalloc_track_caller+0x5f/0x320 [ 379.730252][ T9690] kstrdup+0x36/0x70 [ 379.734123][ T9690] device_rename+0xaa/0x190 [ 379.738606][ T9690] dev_change_name+0x2a5/0x8c0 [ 379.743507][ T9690] ? selinux_capable+0x29c/0x380 [ 379.748461][ T9690] ? dev_alloc_name_ns+0x870/0x870 [ 379.753558][ T9690] dev_ifsioc+0x45b/0xa50 [ 379.757864][ T9690] ? dev_ioctl+0xb80/0xb80 [ 379.762257][ T9690] ? security_capable+0x87/0xb0 [ 379.767085][ T9690] dev_ioctl+0x33d/0xb80 [ 379.771308][ T9690] sock_do_ioctl+0x235/0x330 [ 379.775873][ T9690] ? sock_show_fdinfo+0xa0/0xa0 [ 379.780704][ T9690] ? selinux_file_ioctl+0x377/0x480 [ 379.785881][ T9690] ? mutex_trylock+0xa0/0xa0 [ 379.790448][ T9690] ? __fget_files+0x2c4/0x320 [ 379.795101][ T9690] sock_ioctl+0x504/0x710 [ 379.799411][ T9690] ? sock_poll+0x360/0x360 [ 379.803802][ T9690] ? __fget_files+0x2c4/0x320 [ 379.808461][ T9690] ? security_file_ioctl+0x84/0xa0 [ 379.813555][ T9690] ? sock_poll+0x360/0x360 [ 379.817948][ T9690] __se_sys_ioctl+0x121/0x1a0 [ 379.822604][ T9690] __x64_sys_ioctl+0x7b/0x90 [ 379.827172][ T9690] do_syscall_64+0x31/0x40 [ 379.831570][ T9690] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 379.837438][ T9690] RIP: 0033:0x7fdc90b03929 [ 379.841835][ T9690] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 379.861420][ T9690] RSP: 002b:00007fdc8f16c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 379.869814][ T9690] RAX: ffffffffffffffda RBX: 00007fdc90d2afa0 RCX: 00007fdc90b03929 [ 379.877765][ T9690] RDX: 00002000000000c0 RSI: 0000000000008923 RDI: 0000000000000008 [ 379.885715][ T9690] RBP: 00007fdc8f16c090 R08: 0000000000000000 R09: 0000000000000000 [ 379.893666][ T9690] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 379.901620][ T9690] R13: 0000000000000000 R14: 00007fdc90d2afa0 R15: 00007ffcfc1e4c48 [ 380.274403][ T9715] syz.2.3211[9715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 380.274486][ T9715] syz.2.3211[9715] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 381.061471][ T9741] device sit0 entered promiscuous mode [ 381.545049][ T9753] device sit0 entered promiscuous mode [ 381.834282][ T9757] device sit0 left promiscuous mode [ 382.300033][ T9768] device veth1_macvtap left promiscuous mode [ 382.306047][ T9768] device macsec0 entered promiscuous mode [ 382.606448][ T9772] device veth1_macvtap entered promiscuous mode [ 383.295474][ T9792] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 383.801061][ T9819] syz.2.3243[9819] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 383.801147][ T9819] syz.2.3243[9819] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 385.084608][ T9870] device sit0 entered promiscuous mode [ 385.102036][ T9869] syz.0.3262[9869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 385.102122][ T9869] syz.0.3262[9869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 389.205356][ T9945] device veth1_macvtap left promiscuous mode [ 389.427409][ T9945] device macsec0 entered promiscuous mode [ 390.787323][T10003] device pim6reg1 entered promiscuous mode [ 390.830847][T10007] FAULT_INJECTION: forcing a failure. [ 390.830847][T10007] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 390.864622][T10007] CPU: 0 PID: 10007 Comm: syz.3.3311 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 390.876018][T10007] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 390.886062][T10007] Call Trace: [ 390.889348][T10007] __dump_stack+0x21/0x24 [ 390.893671][T10007] dump_stack_lvl+0x169/0x1d8 [ 390.898337][T10007] ? show_regs_print_info+0x18/0x18 [ 390.903522][T10007] ? stack_trace_save+0x98/0xe0 [ 390.908366][T10007] dump_stack+0x15/0x1c [ 390.912522][T10007] should_fail+0x3c1/0x510 [ 390.916931][T10007] should_fail_alloc_page+0x4f/0x60 [ 390.922115][T10007] __alloc_pages_nodemask+0x109/0x5f0 [ 390.927476][T10007] ? rotate_reclaimable_page+0x4a0/0x4a0 [ 390.933104][T10007] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 390.938636][T10007] ? __mod_node_page_state+0x9e/0xd0 [ 390.943905][T10007] ? lru_cache_add+0x164/0x380 [ 390.948661][T10007] ? __lru_cache_add_inactive_or_unevictable+0x38/0x160 [ 390.955585][T10007] wp_page_copy+0x1d0/0x15d0 [ 390.960160][T10007] ? stack_trace_save+0xe0/0xe0 [ 390.965013][T10007] ? trace_spf_pte_lock+0x110/0x110 [ 390.970204][T10007] ? __update_load_avg_cfs_rq+0xaf/0x2f0 [ 390.975825][T10007] ? longest_prefix_match+0x43c/0x640 [ 390.981198][T10007] ? copy_fpregs_to_fpstate+0x14a/0x1b0 [ 390.986736][T10007] do_wp_page+0x9a6/0xc80 [ 390.991057][T10007] handle_pte_fault+0xac1/0x3750 [ 390.995987][T10007] handle_mm_fault+0xf3f/0x16a0 [ 391.000831][T10007] ? _raw_spin_unlock_irq+0x4e/0x70 [ 391.006025][T10007] ? can_reuse_spf_vma+0xe0/0xe0 [ 391.010955][T10007] ? __kasan_check_write+0x14/0x20 [ 391.016056][T10007] ? down_read_trylock+0x100/0x150 [ 391.021155][T10007] ? __init_rwsem+0x1c0/0x1c0 [ 391.025824][T10007] ? find_vma+0x30/0x150 [ 391.030058][T10007] do_user_addr_fault+0x5a2/0xc80 [ 391.035074][T10007] ? do_kern_addr_fault+0x80/0x80 [ 391.040084][T10007] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 391.045530][T10007] ? _raw_spin_lock+0xe0/0xe0 [ 391.050206][T10007] exc_page_fault+0x5a/0xc0 [ 391.054702][T10007] asm_exc_page_fault+0x1e/0x30 [ 391.059546][T10007] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 391.066126][T10007] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 391.085720][T10007] RSP: 0018:ffffc90000c27d40 EFLAGS: 00050206 [ 391.091778][T10007] RAX: ffffffff823a3c01 RBX: 000000000000b161 RCX: 00000000000098e1 [ 391.099735][T10007] RDX: 000000000000b161 RSI: ffff88811f911880 RDI: 0000200000003000 [ 391.107694][T10007] RBP: ffffc90000c27d70 R08: 0000000000000001 R09: 0000000000000000 [ 391.115656][T10007] R10: ffffed1023f2362c R11: 0000000000001628 R12: 00007ffffffff000 [ 391.123613][T10007] R13: 000020000000c8e1 R14: ffff88811f910000 R15: 0000200000001780 [ 391.131580][T10007] ? _copy_to_user+0x21/0x90 [ 391.136156][T10007] ? _copy_to_user+0x78/0x90 [ 391.140738][T10007] map_lookup_and_delete_elem+0x409/0x530 [ 391.146450][T10007] __se_sys_bpf+0x454/0x680 [ 391.150943][T10007] ? __x64_sys_bpf+0x90/0x90 [ 391.155520][T10007] ? fpu__clear_all+0x20/0x20 [ 391.160186][T10007] __x64_sys_bpf+0x7b/0x90 [ 391.164586][T10007] do_syscall_64+0x31/0x40 [ 391.168990][T10007] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 391.174865][T10007] RIP: 0033:0x7f882ff09929 [ 391.179267][T10007] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 391.198864][T10007] RSP: 002b:00007f882e572038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 391.207270][T10007] RAX: ffffffffffffffda RBX: 00007f8830130fa0 RCX: 00007f882ff09929 [ 391.215224][T10007] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000015 [ 391.223184][T10007] RBP: 00007f882e572090 R08: 0000000000000000 R09: 0000000000000000 [ 391.231144][T10007] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 391.239104][T10007] R13: 0000000000000000 R14: 00007f8830130fa0 R15: 00007fff0aea2778 [ 391.372419][T10022] device syzkaller0 entered promiscuous mode [ 394.355484][T10106] device syzkaller0 entered promiscuous mode [ 395.067351][T10120] tap0: tun_chr_ioctl cmd 1074025675 [ 395.072679][T10120] tap0: persist enabled [ 395.601652][T10141] FAULT_INJECTION: forcing a failure. [ 395.601652][T10141] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 395.879933][T10141] CPU: 1 PID: 10141 Comm: syz.1.3361 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 395.891328][T10141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 395.901378][T10141] Call Trace: [ 395.904667][T10141] __dump_stack+0x21/0x24 [ 395.908988][T10141] dump_stack_lvl+0x169/0x1d8 [ 395.913656][T10141] ? show_regs_print_info+0x18/0x18 [ 395.918846][T10141] dump_stack+0x15/0x1c [ 395.922989][T10141] should_fail+0x3c1/0x510 [ 395.927395][T10141] should_fail_usercopy+0x1a/0x20 [ 395.932415][T10141] _copy_from_user+0x20/0xd0 [ 395.937007][T10141] iovec_from_user+0x1bc/0x2f0 [ 395.941764][T10141] ? kstrtouint_from_user+0x1a0/0x200 [ 395.947126][T10141] __import_iovec+0x71/0x390 [ 395.951701][T10141] ? memset+0x35/0x40 [ 395.955676][T10141] import_iovec+0x7c/0xb0 [ 395.959991][T10141] ___sys_recvmsg+0x420/0x4f0 [ 395.964658][T10141] ? __sys_recvmsg+0x250/0x250 [ 395.969410][T10141] ? __fdget+0x1a1/0x230 [ 395.973642][T10141] __x64_sys_recvmsg+0x1dd/0x2a0 [ 395.978560][T10141] ? fput+0x1a/0x20 [ 395.982359][T10141] ? ___sys_recvmsg+0x4f0/0x4f0 [ 395.987197][T10141] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 395.993253][T10141] do_syscall_64+0x31/0x40 [ 395.997664][T10141] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 396.003540][T10141] RIP: 0033:0x7f56bea8e929 [ 396.007943][T10141] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 396.027533][T10141] RSP: 002b:00007f56bd0f7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 396.035939][T10141] RAX: ffffffffffffffda RBX: 00007f56becb5fa0 RCX: 00007f56bea8e929 [ 396.043905][T10141] RDX: 00000000000040fd RSI: 0000200000000b00 RDI: 0000000000000006 [ 396.051955][T10141] RBP: 00007f56bd0f7090 R08: 0000000000000000 R09: 0000000000000000 [ 396.059912][T10141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 396.067868][T10141] R13: 0000000000000000 R14: 00007f56becb5fa0 R15: 00007ffe3fa80c38 [ 397.810606][T10168] device wg2 entered promiscuous mode [ 399.470261][T10185] device sit0 left promiscuous mode [ 399.707304][T10185] device sit0 entered promiscuous mode [ 404.921159][T10315] device veth0_vlan left promiscuous mode [ 404.981367][T10315] device veth0_vlan entered promiscuous mode [ 405.169816][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 405.210585][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 405.225952][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 405.251972][T10314] device wg2 left promiscuous mode [ 405.396058][T10315] device wg2 entered promiscuous mode [ 406.277449][T10356] device veth1_macvtap entered promiscuous mode [ 406.303096][ T414] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 406.495742][T10372] device sit0 left promiscuous mode [ 406.841455][T10386] device sit0 entered promiscuous mode [ 406.975725][T10410] FAULT_INJECTION: forcing a failure. [ 406.975725][T10410] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 406.998331][T10410] CPU: 1 PID: 10410 Comm: syz.0.3453 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 407.009726][T10410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 407.019769][T10410] Call Trace: [ 407.023051][T10410] __dump_stack+0x21/0x24 [ 407.027367][T10410] dump_stack_lvl+0x169/0x1d8 [ 407.032032][T10410] ? show_regs_print_info+0x18/0x18 [ 407.037214][T10410] ? irqentry_exit+0x56/0x60 [ 407.041791][T10410] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 407.047586][T10410] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 407.053727][T10410] dump_stack+0x15/0x1c [ 407.057872][T10410] should_fail+0x3c1/0x510 [ 407.062271][T10410] should_fail_usercopy+0x1a/0x20 [ 407.067280][T10410] _copy_from_user+0x20/0xd0 [ 407.071855][T10410] __se_sys_bpf+0x181/0x680 [ 407.076340][T10410] ? __x64_sys_bpf+0x90/0x90 [ 407.080919][T10410] ? debug_smp_processor_id+0x17/0x20 [ 407.086278][T10410] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 407.092332][T10410] __x64_sys_bpf+0x7b/0x90 [ 407.096736][T10410] do_syscall_64+0x31/0x40 [ 407.101141][T10410] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 407.107021][T10410] RIP: 0033:0x7fc1a3cd8929 [ 407.111425][T10410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 407.131014][T10410] RSP: 002b:00007fc1a2341038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 407.139417][T10410] RAX: ffffffffffffffda RBX: 00007fc1a3efffa0 RCX: 00007fc1a3cd8929 [ 407.147376][T10410] RDX: 0000000000000090 RSI: 0000200000000840 RDI: 0000000000000005 [ 407.155336][T10410] RBP: 00007fc1a2341090 R08: 0000000000000000 R09: 0000000000000000 [ 407.163293][T10410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 407.171253][T10410] R13: 0000000000000000 R14: 00007fc1a3efffa0 R15: 00007ffd2dcf0cb8 [ 407.876273][T10435] device syzkaller0 entered promiscuous mode [ 408.245197][ T24] audit: type=1400 audit(1749586397.299:150): avc: denied { create } for pid=10472 comm="syz.2.3476" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 411.869223][T10670] FAULT_INJECTION: forcing a failure. [ 411.869223][T10670] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 411.919706][T10670] CPU: 0 PID: 10670 Comm: syz.3.3553 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 411.931103][T10670] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 411.941154][T10670] Call Trace: [ 411.944439][T10670] __dump_stack+0x21/0x24 [ 411.948760][T10670] dump_stack_lvl+0x169/0x1d8 [ 411.953439][T10670] ? show_regs_print_info+0x18/0x18 [ 411.958628][T10670] dump_stack+0x15/0x1c [ 411.962770][T10670] should_fail+0x3c1/0x510 [ 411.967174][T10670] should_fail_alloc_page+0x4f/0x60 [ 411.972358][T10670] __alloc_pages_nodemask+0x109/0x5f0 [ 411.977728][T10670] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 411.983263][T10670] ? kvm_sched_clock_read+0x18/0x40 [ 411.988451][T10670] ? sched_clock+0x3a/0x40 [ 411.992851][T10670] ? sched_clock_cpu+0x1b/0x3d0 [ 411.997689][T10670] shmem_alloc_page+0x1b1/0x300 [ 412.002525][T10670] ? put_page+0xd0/0xd0 [ 412.006681][T10670] ? percpu_counter_add_batch+0x13c/0x160 [ 412.012400][T10670] shmem_alloc_and_acct_page+0x36f/0x7b0 [ 412.018023][T10670] ? shmem_swapin_page+0x16c0/0x16c0 [ 412.023301][T10670] ? xas_load+0x28b/0x2a0 [ 412.027617][T10670] ? find_get_entry+0x366/0x3c0 [ 412.032453][T10670] ? page_cache_prev_miss+0x270/0x270 [ 412.037816][T10670] ? find_lock_entry+0x4b/0x200 [ 412.042654][T10670] ? sched_clock_cpu+0x1b/0x3d0 [ 412.047489][T10670] shmem_getpage_gfp+0x625/0x2110 [ 412.052505][T10670] shmem_write_begin+0xce/0x1b0 [ 412.057344][T10670] generic_perform_write+0x2be/0x510 [ 412.062627][T10670] ? grab_cache_page_write_begin+0xb0/0xb0 [ 412.068424][T10670] __generic_file_write_iter+0x24b/0x480 [ 412.074040][T10670] ? generic_write_checks+0x3d4/0x480 [ 412.079402][T10670] generic_file_write_iter+0xa9/0x1d0 [ 412.084759][T10670] vfs_write+0x725/0xd60 [ 412.088995][T10670] ? kernel_write+0x3c0/0x3c0 [ 412.093660][T10670] ? mutex_trylock+0xa0/0xa0 [ 412.098231][T10670] ? __fget_files+0x2c4/0x320 [ 412.102900][T10670] ? __fdget_pos+0x2d2/0x380 [ 412.107477][T10670] ? ksys_write+0x71/0x240 [ 412.111877][T10670] ksys_write+0x140/0x240 [ 412.116192][T10670] ? __ia32_sys_read+0x90/0x90 [ 412.120942][T10670] ? debug_smp_processor_id+0x17/0x20 [ 412.126309][T10670] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 412.132365][T10670] __x64_sys_write+0x7b/0x90 [ 412.136942][T10670] do_syscall_64+0x31/0x40 [ 412.141347][T10670] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 412.147224][T10670] RIP: 0033:0x7f882ff09929 [ 412.151628][T10670] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 412.171225][T10670] RSP: 002b:00007f882e572038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 412.179629][T10670] RAX: ffffffffffffffda RBX: 00007f8830130fa0 RCX: 00007f882ff09929 [ 412.187595][T10670] RDX: 00000000002a979d RSI: 0000200000000000 RDI: 0000000000000005 [ 412.195555][T10670] RBP: 00007f882e572090 R08: 0000000000000000 R09: 0000000000000000 [ 412.203511][T10670] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 412.211459][T10670] R13: 0000000000000000 R14: 00007f8830130fa0 R15: 00007fff0aea2778 [ 413.936527][T10727] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 414.091532][T10727] device syzkaller0 entered promiscuous mode [ 414.215328][T10761] syz.3.3587[10761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 414.215382][T10761] syz.3.3587[10761] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 414.266456][T10763] device sit0 left promiscuous mode [ 414.343896][T10763] device sit0 entered promiscuous mode [ 416.454580][T10823] device sit0 left promiscuous mode [ 416.621371][T10830] device sit0 entered promiscuous mode [ 417.488679][T10858] device veth0_vlan left promiscuous mode [ 417.630121][T10858] device veth0_vlan entered promiscuous mode [ 417.710845][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 417.743582][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 417.786531][T10870] syz.4.3623[10870] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 417.786612][T10870] syz.4.3623[10870] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 417.792280][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 418.255442][T10880] device sit0 left promiscuous mode [ 418.365952][T10883] device sit0 entered promiscuous mode [ 419.391980][T10917] FAULT_INJECTION: forcing a failure. [ 419.391980][T10917] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 419.405228][T10917] CPU: 0 PID: 10917 Comm: syz.0.3639 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 419.416593][T10917] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 419.426646][T10917] Call Trace: [ 419.429937][T10917] __dump_stack+0x21/0x24 [ 419.434261][T10917] dump_stack_lvl+0x169/0x1d8 [ 419.438933][T10917] ? thaw_kernel_threads+0x220/0x220 [ 419.444219][T10917] ? show_regs_print_info+0x18/0x18 [ 419.449411][T10917] dump_stack+0x15/0x1c [ 419.453566][T10917] should_fail+0x3c1/0x510 [ 419.457975][T10917] should_fail_usercopy+0x1a/0x20 [ 419.462991][T10917] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 419.469035][T10917] generic_perform_write+0x326/0x510 [ 419.474308][T10917] ? grab_cache_page_write_begin+0xb0/0xb0 [ 419.480095][T10917] ? file_remove_privs+0x580/0x580 [ 419.485181][T10917] ? __kasan_check_write+0x14/0x20 [ 419.490272][T10917] ? down_write+0xac/0x110 [ 419.494683][T10917] __generic_file_write_iter+0x24b/0x480 [ 419.500303][T10917] ? generic_write_checks+0x3d4/0x480 [ 419.505663][T10917] generic_file_write_iter+0xa9/0x1d0 [ 419.511030][T10917] vfs_write+0x725/0xd60 [ 419.515267][T10917] ? sched_clock_cpu+0x1b/0x3d0 [ 419.520110][T10917] ? kernel_write+0x3c0/0x3c0 [ 419.524778][T10917] ? mutex_trylock+0xa0/0xa0 [ 419.529356][T10917] ? __fget_files+0x2c4/0x320 [ 419.534030][T10917] ? __fdget_pos+0x2d2/0x380 [ 419.538611][T10917] ? ksys_write+0x71/0x240 [ 419.543029][T10917] ksys_write+0x140/0x240 [ 419.547361][T10917] ? __ia32_sys_read+0x90/0x90 [ 419.552121][T10917] ? debug_smp_processor_id+0x17/0x20 [ 419.557489][T10917] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 419.563555][T10917] __x64_sys_write+0x7b/0x90 [ 419.568144][T10917] do_syscall_64+0x31/0x40 [ 419.572564][T10917] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 419.578448][T10917] RIP: 0033:0x7fc1a3cd8929 [ 419.582853][T10917] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 419.602454][T10917] RSP: 002b:00007fc1a2341038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 419.610870][T10917] RAX: ffffffffffffffda RBX: 00007fc1a3efffa0 RCX: 00007fc1a3cd8929 [ 419.618834][T10917] RDX: 00000000002a979d RSI: 0000200000000000 RDI: 0000000000000005 [ 419.626791][T10917] RBP: 00007fc1a2341090 R08: 0000000000000000 R09: 0000000000000000 [ 419.634739][T10917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 419.642690][T10917] R13: 0000000000000000 R14: 00007fc1a3efffa0 R15: 00007ffd2dcf0cb8 [ 419.887841][T10921] device syzkaller0 entered promiscuous mode [ 420.482286][T10950] device sit0 left promiscuous mode [ 422.831542][T11002] device sit0 entered promiscuous mode [ 423.767671][T11017] device veth1_macvtap left promiscuous mode [ 424.403109][T11044] device sit0 left promiscuous mode [ 424.413607][T11045] device sit0 entered promiscuous mode [ 428.009037][T11118] syz.4.3711[11118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 428.009116][T11118] syz.4.3711[11118] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 429.427755][T11136] GPL: port 1(erspan0) entered blocking state [ 429.514339][T11136] GPL: port 1(erspan0) entered disabled state [ 429.647318][T11136] device erspan0 entered promiscuous mode [ 430.192515][T11152] syz.3.3722[11152] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.192603][T11152] syz.3.3722[11152] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 430.472744][T11155] device sit0 left promiscuous mode [ 432.688945][T11192] syz.1.3735[11192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 432.689029][T11192] syz.1.3735[11192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.100334][ T24] audit: type=1400 audit(1749586423.159:151): avc: denied { read } for pid=11212 comm="syz.2.3742" name="cgroup.subtree_control" dev="cgroup2" ino=173 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 434.684234][T11226] device sit0 left promiscuous mode [ 434.751950][T11226] device sit0 entered promiscuous mode [ 434.800987][T11234] syz.0.3747[11234] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 434.801078][T11234] syz.0.3747[11234] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 435.767211][T11243] device sit0 entered promiscuous mode [ 437.631752][T11287] syz.2.3761[11287] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 437.631833][T11287] syz.2.3761[11287] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 437.637337][T11285] syz.2.3761[11285] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 437.745199][T11288] syz.2.3761[11288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 437.756779][T11288] syz.2.3761[11288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 437.888249][T11285] syz.2.3761[11285] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 440.849294][T11346] device sit0 left promiscuous mode [ 440.923142][T11347] device sit0 entered promiscuous mode [ 441.988491][T11369] device sit0 left promiscuous mode [ 442.311376][T11369] device sit0 entered promiscuous mode [ 444.106935][T11409] device veth0_vlan left promiscuous mode [ 444.150998][T11409] device veth0_vlan entered promiscuous mode [ 444.174454][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 444.183526][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 444.192019][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 444.225673][T11422] syz.0.3802[11422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 444.225756][T11422] syz.0.3802[11422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.485815][T11456] device pim6reg1 entered promiscuous mode [ 445.998371][T11470] syz.3.3818[11470] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 445.998456][T11470] syz.3.3818[11470] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 446.953326][T11499] syz.0.3829[11499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 446.988815][T11499] syz.0.3829[11499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 448.217480][T11554] FAULT_INJECTION: forcing a failure. [ 448.217480][T11554] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 448.324217][T11554] CPU: 1 PID: 11554 Comm: syz.0.3851 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 448.335611][T11554] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 448.345655][T11554] Call Trace: [ 448.348945][T11554] __dump_stack+0x21/0x24 [ 448.353273][T11554] dump_stack_lvl+0x169/0x1d8 [ 448.357945][T11554] ? show_regs_print_info+0x18/0x18 [ 448.363133][T11554] ? stack_trace_save+0x98/0xe0 [ 448.367973][T11554] dump_stack+0x15/0x1c [ 448.372119][T11554] should_fail+0x3c1/0x510 [ 448.376530][T11554] should_fail_alloc_page+0x4f/0x60 [ 448.381713][T11554] __alloc_pages_nodemask+0x109/0x5f0 [ 448.387082][T11554] ? rotate_reclaimable_page+0x4a0/0x4a0 [ 448.392701][T11554] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 448.398243][T11554] ? __mod_node_page_state+0x9e/0xd0 [ 448.403518][T11554] ? lru_cache_add+0x164/0x380 [ 448.408276][T11554] ? __lru_cache_add_inactive_or_unevictable+0x38/0x160 [ 448.415203][T11554] wp_page_copy+0x1d0/0x15d0 [ 448.419783][T11554] ? stack_trace_save+0xe0/0xe0 [ 448.424629][T11554] ? trace_spf_pte_lock+0x110/0x110 [ 448.429822][T11554] ? __set_page_owner+0x3b/0x2a0 [ 448.434756][T11554] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 448.440813][T11554] do_wp_page+0x9a6/0xc80 [ 448.445131][T11554] handle_pte_fault+0xac1/0x3750 [ 448.450059][T11554] handle_mm_fault+0xf3f/0x16a0 [ 448.454898][T11554] ? prep_new_page+0x10c/0x180 [ 448.459663][T11554] ? can_reuse_spf_vma+0xe0/0xe0 [ 448.464589][T11554] ? bpf_get_current_comm+0x44/0xa0 [ 448.469782][T11554] ? __kasan_check_write+0x14/0x20 [ 448.474880][T11554] ? down_read_trylock+0x100/0x150 [ 448.479989][T11554] ? __init_rwsem+0x1c0/0x1c0 [ 448.484672][T11554] ? find_vma+0x30/0x150 [ 448.488905][T11554] do_user_addr_fault+0x5a2/0xc80 [ 448.493922][T11554] ? do_kern_addr_fault+0x80/0x80 [ 448.498941][T11554] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 448.504389][T11554] ? _raw_spin_lock+0xe0/0xe0 [ 448.509065][T11554] exc_page_fault+0x5a/0xc0 [ 448.513561][T11554] asm_exc_page_fault+0x1e/0x30 [ 448.518422][T11554] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 448.524997][T11554] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 448.544602][T11554] RSP: 0018:ffffc90000c27d40 EFLAGS: 00050206 [ 448.550665][T11554] RAX: ffffffff823a3c01 RBX: 000000000000b161 RCX: 00000000000028e1 [ 448.558629][T11554] RDX: 000000000000b161 RSI: ffff888120878880 RDI: 000020000000a000 [ 448.566596][T11554] RBP: ffffc90000c27d70 R08: 0000000000000001 R09: 0000000000000000 [ 448.574556][T11554] R10: ffffed102410f62c R11: 0000000000001628 R12: 00007ffffffff000 [ 448.582521][T11554] R13: 000020000000c8e1 R14: ffff888120870000 R15: 0000200000001780 [ 448.590504][T11554] ? _copy_to_user+0x21/0x90 [ 448.595085][T11554] ? _copy_to_user+0x78/0x90 [ 448.599669][T11554] map_lookup_and_delete_elem+0x409/0x530 [ 448.605388][T11554] __se_sys_bpf+0x454/0x680 [ 448.609879][T11554] ? __x64_sys_bpf+0x90/0x90 [ 448.614461][T11554] ? __bpf_trace_sys_enter+0x62/0x70 [ 448.619733][T11554] __x64_sys_bpf+0x7b/0x90 [ 448.624137][T11554] do_syscall_64+0x31/0x40 [ 448.628544][T11554] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 448.634424][T11554] RIP: 0033:0x7fc1a3cd8929 [ 448.638827][T11554] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 448.658428][T11554] RSP: 002b:00007fc1a2341038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 448.666840][T11554] RAX: ffffffffffffffda RBX: 00007fc1a3efffa0 RCX: 00007fc1a3cd8929 [ 448.674807][T11554] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000015 [ 448.682771][T11554] RBP: 00007fc1a2341090 R08: 0000000000000000 R09: 0000000000000000 [ 448.690732][T11554] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 448.698701][T11554] R13: 0000000000000000 R14: 00007fc1a3efffa0 R15: 00007ffd2dcf0cb8 [ 449.831174][T11614] device syzkaller0 entered promiscuous mode [ 452.064652][T11678] device sit0 left promiscuous mode [ 452.479872][T11684] device sit0 entered promiscuous mode [ 452.873342][T11686] device wg2 entered promiscuous mode [ 452.895009][T11687] bridge0: port 2(bridge_slave_1) entered disabled state [ 452.902276][T11687] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.936202][T11752] device syzkaller0 entered promiscuous mode [ 456.781681][T11842] FAULT_INJECTION: forcing a failure. [ 456.781681][T11842] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 456.962682][T11842] CPU: 1 PID: 11842 Comm: syz.4.3955 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 456.974082][T11842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 456.984135][T11842] Call Trace: [ 456.987419][T11842] __dump_stack+0x21/0x24 [ 456.991738][T11842] dump_stack_lvl+0x169/0x1d8 [ 456.996404][T11842] ? show_regs_print_info+0x18/0x18 [ 457.001599][T11842] dump_stack+0x15/0x1c [ 457.005762][T11842] should_fail+0x3c1/0x510 [ 457.010169][T11842] should_fail_usercopy+0x1a/0x20 [ 457.015194][T11842] _copy_from_iter+0x1d1/0x9f0 [ 457.019954][T11842] ? __kasan_check_read+0x11/0x20 [ 457.024976][T11842] ? __check_object_size+0x2f4/0x3c0 [ 457.030249][T11842] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 457.035954][T11842] ? skb_put+0x10e/0x1f0 [ 457.040186][T11842] tun_get_user+0x140a/0x3090 [ 457.044855][T11842] ? __x64_sys_openat+0x136/0x160 [ 457.049873][T11842] ? tun_do_read+0x1c00/0x1c00 [ 457.054641][T11842] ? kstrtouint_from_user+0x1a0/0x200 [ 457.060112][T11842] ? __fsnotify_parent+0x5f5/0x6c0 [ 457.065215][T11842] ? avc_policy_seqno+0x1b/0x70 [ 457.070055][T11842] ? selinux_file_permission+0x2a5/0x510 [ 457.075687][T11842] ? fsnotify_perm+0x66/0x4b0 [ 457.080363][T11842] tun_chr_write_iter+0x1bf/0x270 [ 457.085384][T11842] vfs_write+0x725/0xd60 [ 457.089618][T11842] ? kernel_write+0x3c0/0x3c0 [ 457.094288][T11842] ? __fget_files+0x2c4/0x320 [ 457.098954][T11842] ? __fdget_pos+0x1f7/0x380 [ 457.103538][T11842] ? ksys_write+0x71/0x240 [ 457.107944][T11842] ksys_write+0x140/0x240 [ 457.112261][T11842] ? __ia32_sys_read+0x90/0x90 [ 457.117016][T11842] ? fpu__clear_all+0x20/0x20 [ 457.121683][T11842] __x64_sys_write+0x7b/0x90 [ 457.126260][T11842] do_syscall_64+0x31/0x40 [ 457.130668][T11842] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 457.136551][T11842] RIP: 0033:0x7fdc90b03929 [ 457.140972][T11842] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 457.160571][T11842] RSP: 002b:00007fdc8f16c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 457.168985][T11842] RAX: ffffffffffffffda RBX: 00007fdc90d2afa0 RCX: 00007fdc90b03929 [ 457.176948][T11842] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 457.184913][T11842] RBP: 00007fdc8f16c090 R08: 0000000000000000 R09: 0000000000000000 [ 457.192878][T11842] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 457.200844][T11842] R13: 0000000000000000 R14: 00007fdc90d2afa0 R15: 00007ffcfc1e4c48 [ 458.968578][T11888] device syzkaller0 entered promiscuous mode [ 459.421246][ T24] audit: type=1400 audit(1749586448.479:152): avc: denied { create } for pid=11925 comm="syz.3.3987" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 460.199577][T11953] device sit0 left promiscuous mode [ 460.298750][T11955] device sit0 entered promiscuous mode [ 461.508644][T12001] device sit0 left promiscuous mode [ 461.924732][T12009] device sit0 left promiscuous mode [ 462.690166][T12024] device sit0 left promiscuous mode [ 463.319749][T12036] device sit0 entered promiscuous mode [ 465.684243][T12110] ÿ: renamed from bond_slave_0 [ 465.739195][T12116] device sit0 entered promiscuous mode [ 466.087519][T12139] device sit0 left promiscuous mode [ 466.133273][T12146] device sit0 entered promiscuous mode [ 466.229377][T12158] FAULT_INJECTION: forcing a failure. [ 466.229377][T12158] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 466.242585][T12158] CPU: 0 PID: 12158 Comm: syz.1.4078 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 466.253941][T12158] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 466.263991][T12158] Call Trace: [ 466.267274][T12158] __dump_stack+0x21/0x24 [ 466.271587][T12158] dump_stack_lvl+0x169/0x1d8 [ 466.276251][T12158] ? thaw_kernel_threads+0x220/0x220 [ 466.281525][T12158] ? show_regs_print_info+0x18/0x18 [ 466.286713][T12158] dump_stack+0x15/0x1c [ 466.290859][T12158] should_fail+0x3c1/0x510 [ 466.295258][T12158] should_fail_usercopy+0x1a/0x20 [ 466.300267][T12158] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 466.306329][T12158] generic_perform_write+0x326/0x510 [ 466.311607][T12158] ? grab_cache_page_write_begin+0xb0/0xb0 [ 466.317400][T12158] ? file_remove_privs+0x580/0x580 [ 466.322501][T12158] __generic_file_write_iter+0x24b/0x480 [ 466.328119][T12158] ? generic_write_checks+0x3d4/0x480 [ 466.333477][T12158] generic_file_write_iter+0xa9/0x1d0 [ 466.338835][T12158] vfs_write+0x725/0xd60 [ 466.343062][T12158] ? kernel_write+0x3c0/0x3c0 [ 466.347729][T12158] ? mutex_trylock+0xa0/0xa0 [ 466.352303][T12158] ? __fget_files+0x2c4/0x320 [ 466.356965][T12158] ? __fdget_pos+0x2d2/0x380 [ 466.361546][T12158] ? ksys_write+0x71/0x240 [ 466.365944][T12158] ksys_write+0x140/0x240 [ 466.370265][T12158] ? __ia32_sys_read+0x90/0x90 [ 466.375017][T12158] ? debug_smp_processor_id+0x17/0x20 [ 466.380375][T12158] __x64_sys_write+0x7b/0x90 [ 466.384952][T12158] do_syscall_64+0x31/0x40 [ 466.389356][T12158] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 466.395232][T12158] RIP: 0033:0x7f56bea8e929 [ 466.399636][T12158] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 466.419234][T12158] RSP: 002b:00007f56bd0f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 466.427638][T12158] RAX: ffffffffffffffda RBX: 00007f56becb5fa0 RCX: 00007f56bea8e929 [ 466.435605][T12158] RDX: 00000000002a979d RSI: 0000200000000000 RDI: 0000000000000005 [ 466.443569][T12158] RBP: 00007f56bd0f7090 R08: 0000000000000000 R09: 0000000000000000 [ 466.451534][T12158] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 466.459496][T12158] R13: 0000000000000000 R14: 00007f56becb5fa0 R15: 00007ffe3fa80c38 [ 466.914311][T12167] device syzkaller0 entered promiscuous mode [ 469.111485][T12255] device syzkaller0 entered promiscuous mode [ 469.390800][T12259] FAULT_INJECTION: forcing a failure. [ 469.390800][T12259] name failslab, interval 1, probability 0, space 0, times 0 [ 469.539939][T12259] CPU: 1 PID: 12259 Comm: syz.2.4115 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 469.551331][T12259] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 469.561376][T12259] Call Trace: [ 469.564659][T12259] __dump_stack+0x21/0x24 [ 469.568966][T12259] dump_stack_lvl+0x169/0x1d8 [ 469.573625][T12259] ? thaw_kernel_threads+0x220/0x220 [ 469.578886][T12259] ? show_regs_print_info+0x18/0x18 [ 469.584060][T12259] dump_stack+0x15/0x1c [ 469.588193][T12259] should_fail+0x3c1/0x510 [ 469.592588][T12259] ? sk_prot_alloc+0x5c/0x340 [ 469.597246][T12259] __should_failslab+0xa4/0xe0 [ 469.601984][T12259] should_failslab+0x9/0x20 [ 469.606470][T12259] kmem_cache_alloc+0x3d/0x2e0 [ 469.611211][T12259] sk_prot_alloc+0x5c/0x340 [ 469.615690][T12259] sk_alloc+0x38/0x4e0 [ 469.619734][T12259] ? _raw_spin_lock+0x8e/0xe0 [ 469.624389][T12259] inet6_create+0x5a3/0xf90 [ 469.628867][T12259] __sock_create+0x38d/0x770 [ 469.633433][T12259] __sys_socketpair+0x1a1/0x590 [ 469.638257][T12259] __x64_sys_socketpair+0x9b/0xb0 [ 469.643254][T12259] do_syscall_64+0x31/0x40 [ 469.647647][T12259] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 469.653514][T12259] RIP: 0033:0x7fb3d862e929 [ 469.657904][T12259] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 469.677496][T12259] RSP: 002b:00007fb3d6c97038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 469.685891][T12259] RAX: ffffffffffffffda RBX: 00007fb3d8855fa0 RCX: 00007fb3d862e929 [ 469.693844][T12259] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 469.701795][T12259] RBP: 00007fb3d6c97090 R08: 0000000000000000 R09: 0000000000000000 [ 469.709748][T12259] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 469.717698][T12259] R13: 0000000000000000 R14: 00007fb3d8855fa0 R15: 00007ffeaa2b77f8 [ 469.887308][T12270] device sit0 left promiscuous mode [ 469.993403][T12272] device sit0 entered promiscuous mode [ 470.060984][T12277] device pim6reg1 entered promiscuous mode [ 472.236650][T12356] syz.3.4152[12356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 472.236732][T12356] syz.3.4152[12356] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 472.794177][T12366] device macsec0 entered promiscuous mode [ 473.470094][T12384] FAULT_INJECTION: forcing a failure. [ 473.470094][T12384] name failslab, interval 1, probability 0, space 0, times 0 [ 473.482761][T12384] CPU: 1 PID: 12384 Comm: syz.2.4161 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 473.494116][T12384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 473.504168][T12384] Call Trace: [ 473.507462][T12384] __dump_stack+0x21/0x24 [ 473.511784][T12384] dump_stack_lvl+0x169/0x1d8 [ 473.516449][T12384] ? thaw_kernel_threads+0x220/0x220 [ 473.521727][T12384] ? show_regs_print_info+0x18/0x18 [ 473.526918][T12384] ? __kasan_check_write+0x14/0x20 [ 473.532024][T12384] ? skb_release_data+0x3b3/0x670 [ 473.537046][T12384] dump_stack+0x15/0x1c [ 473.541199][T12384] should_fail+0x3c1/0x510 [ 473.545607][T12384] ? skb_clone+0x1e9/0x380 [ 473.550015][T12384] __should_failslab+0xa4/0xe0 [ 473.554769][T12384] should_failslab+0x9/0x20 [ 473.559267][T12384] kmem_cache_alloc+0x3d/0x2e0 [ 473.564031][T12384] ? __bpf_redirect+0x6a7/0xe30 [ 473.568875][T12384] skb_clone+0x1e9/0x380 [ 473.573111][T12384] bpf_clone_redirect+0xa7/0x380 [ 473.578045][T12384] bpf_prog_e2f29814702bf05a+0x56/0xab0 [ 473.583585][T12384] ? sk_get_meminfo+0x240/0x490 [ 473.588455][T12384] ? bpf_prog_test_run_skb+0x31d/0x10b0 [ 473.593993][T12384] ? bpf_prog_test_run+0x350/0x3c0 [ 473.599095][T12384] ? __se_sys_bpf+0x49f/0x680 [ 473.603762][T12384] ? __x64_sys_bpf+0x7b/0x90 [ 473.608343][T12384] ? do_syscall_64+0x31/0x40 [ 473.612922][T12384] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 473.619017][T12384] ? __kasan_check_read+0x11/0x20 [ 473.624035][T12384] ? bpf_test_timer_continue+0x147/0x410 [ 473.629661][T12384] bpf_test_run+0x310/0x9b0 [ 473.634158][T12384] ? convert___skb_to_skb+0x4f0/0x4f0 [ 473.639523][T12384] ? eth_get_headlen+0x1f0/0x1f0 [ 473.644460][T12384] ? convert___skb_to_skb+0x41/0x4f0 [ 473.649738][T12384] bpf_prog_test_run_skb+0x9c2/0x10b0 [ 473.655103][T12384] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 473.660987][T12384] bpf_prog_test_run+0x350/0x3c0 [ 473.665916][T12384] __se_sys_bpf+0x49f/0x680 [ 473.670415][T12384] ? __x64_sys_bpf+0x90/0x90 [ 473.675004][T12384] ? fpu__clear_all+0x20/0x20 [ 473.679677][T12384] __x64_sys_bpf+0x7b/0x90 [ 473.684086][T12384] do_syscall_64+0x31/0x40 [ 473.688499][T12384] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 473.694382][T12384] RIP: 0033:0x7fb3d862e929 [ 473.698787][T12384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 473.718388][T12384] RSP: 002b:00007fb3d6c97038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 473.726796][T12384] RAX: ffffffffffffffda RBX: 00007fb3d8855fa0 RCX: 00007fb3d862e929 [ 473.734763][T12384] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 473.742728][T12384] RBP: 00007fb3d6c97090 R08: 0000000000000000 R09: 0000000000000000 [ 473.750833][T12384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 473.758807][T12384] R13: 0000000000000000 R14: 00007fb3d8855fa0 R15: 00007ffeaa2b77f8 [ 476.339312][T12446] device sit0 left promiscuous mode [ 476.455663][T12446] device sit0 entered promiscuous mode [ 476.676933][T12468] device pim6reg1 entered promiscuous mode [ 484.878606][T12565] device sit0 entered promiscuous mode [ 487.780111][T12633] device sit0 left promiscuous mode [ 487.930405][T12633] device sit0 entered promiscuous mode [ 488.747062][T12674] ÿ: renamed from bond_slave_0 [ 488.843508][T12683] FAULT_INJECTION: forcing a failure. [ 488.843508][T12683] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 488.856834][T12683] CPU: 1 PID: 12683 Comm: syz.4.4264 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 488.868197][T12683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 488.878253][T12683] Call Trace: [ 488.881543][T12683] __dump_stack+0x21/0x24 [ 488.885871][T12683] dump_stack_lvl+0x169/0x1d8 [ 488.890540][T12683] ? thaw_kernel_threads+0x220/0x220 [ 488.895827][T12683] ? vsnprintf+0x1871/0x1960 [ 488.900416][T12683] ? show_regs_print_info+0x18/0x18 [ 488.905616][T12683] dump_stack+0x15/0x1c [ 488.909774][T12683] should_fail+0x3c1/0x510 [ 488.914203][T12683] should_fail_usercopy+0x1a/0x20 [ 488.919315][T12683] _copy_to_user+0x20/0x90 [ 488.923732][T12683] simple_read_from_buffer+0xe9/0x160 [ 488.929103][T12683] proc_fail_nth_read+0x19a/0x210 [ 488.934124][T12683] ? proc_fault_inject_write+0x2f0/0x2f0 [ 488.939748][T12683] ? rw_verify_area+0x1c0/0x360 [ 488.944583][T12683] ? proc_fault_inject_write+0x2f0/0x2f0 [ 488.950199][T12683] vfs_read+0x1fe/0xa10 [ 488.954345][T12683] ? kernel_read+0x70/0x70 [ 488.958748][T12683] ? __kasan_check_write+0x14/0x20 [ 488.963845][T12683] ? mutex_lock+0x8c/0xe0 [ 488.968157][T12683] ? mutex_trylock+0xa0/0xa0 [ 488.972730][T12683] ? __fget_files+0x2c4/0x320 [ 488.977397][T12683] ? __fdget_pos+0x2d2/0x380 [ 488.981973][T12683] ? ksys_read+0x71/0x240 [ 488.986290][T12683] ksys_read+0x140/0x240 [ 488.990517][T12683] ? vfs_write+0xd60/0xd60 [ 488.994918][T12683] ? __sys_socketpair+0xf7/0x590 [ 488.999842][T12683] __x64_sys_read+0x7b/0x90 [ 489.004328][T12683] do_syscall_64+0x31/0x40 [ 489.008734][T12683] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 489.014611][T12683] RIP: 0033:0x7fdc90b0233c [ 489.019022][T12683] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 489.038611][T12683] RSP: 002b:00007fdc8f16c030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 489.047010][T12683] RAX: ffffffffffffffda RBX: 00007fdc90d2afa0 RCX: 00007fdc90b0233c [ 489.054970][T12683] RDX: 000000000000000f RSI: 00007fdc8f16c0a0 RDI: 0000000000000005 [ 489.062926][T12683] RBP: 00007fdc8f16c090 R08: 0000000000000000 R09: 0000000000000000 [ 489.070884][T12683] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 489.078851][T12683] R13: 0000000000000000 R14: 00007fdc90d2afa0 R15: 00007ffcfc1e4c48 [ 489.186989][T12695] device sit0 left promiscuous mode [ 489.290109][T12704] device sit0 left promiscuous mode [ 489.312021][T12695] device sit0 entered promiscuous mode [ 489.367640][T12697] device sit0 entered promiscuous mode [ 490.475554][T12763] device sit0 left promiscuous mode [ 490.617359][T12770] device sit0 entered promiscuous mode [ 492.601276][ T24] audit: type=1400 audit(1749586481.649:153): avc: denied { create } for pid=12818 comm="syz.4.4309" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 495.967585][T12897] device sit0 left promiscuous mode [ 496.048671][T12897] device sit0 entered promiscuous mode [ 499.204263][T13015] device sit0 left promiscuous mode [ 499.278453][T13015] device sit0 entered promiscuous mode [ 500.824174][T13039] FAULT_INJECTION: forcing a failure. [ 500.824174][T13039] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 500.916270][T13039] CPU: 1 PID: 13039 Comm: syz.1.4384 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 500.927661][T13039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 500.937711][T13039] Call Trace: [ 500.941002][T13039] __dump_stack+0x21/0x24 [ 500.945322][T13039] dump_stack_lvl+0x169/0x1d8 [ 500.949996][T13039] ? show_regs_print_info+0x18/0x18 [ 500.955186][T13039] dump_stack+0x15/0x1c [ 500.959337][T13039] should_fail+0x3c1/0x510 [ 500.963747][T13039] should_fail_alloc_page+0x4f/0x60 [ 500.968931][T13039] __alloc_pages_nodemask+0x109/0x5f0 [ 500.974294][T13039] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 500.980343][T13039] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 500.985862][T13039] ? _raw_spin_trylock_bh+0x130/0x130 [ 500.991206][T13039] __get_free_pages+0xe/0x30 [ 500.995768][T13039] kasan_populate_vmalloc_pte+0x29/0x120 [ 501.001386][T13039] __apply_to_page_range+0x74e/0x9e0 [ 501.006662][T13039] ? kasan_populate_vmalloc+0x70/0x70 [ 501.012008][T13039] ? kasan_populate_vmalloc+0x70/0x70 [ 501.017351][T13039] apply_to_page_range+0x3b/0x50 [ 501.022260][T13039] kasan_populate_vmalloc+0x60/0x70 [ 501.027430][T13039] alloc_vmap_area+0x1734/0x1870 [ 501.032345][T13039] ? vm_map_ram+0x9c0/0x9c0 [ 501.036822][T13039] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 501.042336][T13039] ? __get_vm_area_node+0x113/0x450 [ 501.047504][T13039] __get_vm_area_node+0x147/0x450 [ 501.052523][T13039] __vmalloc_node_range+0xe0/0x780 [ 501.057632][T13039] ? htab_map_alloc+0x4b6/0x970 [ 501.062467][T13039] bpf_map_area_alloc+0xd5/0xe0 [ 501.067292][T13039] ? htab_map_alloc+0x4b6/0x970 [ 501.072120][T13039] htab_map_alloc+0x4b6/0x970 [ 501.076776][T13039] map_create+0x441/0x2190 [ 501.081167][T13039] __se_sys_bpf+0x203/0x680 [ 501.085650][T13039] ? __x64_sys_bpf+0x90/0x90 [ 501.090219][T13039] ? fpu__clear_all+0x20/0x20 [ 501.094874][T13039] __x64_sys_bpf+0x7b/0x90 [ 501.099269][T13039] do_syscall_64+0x31/0x40 [ 501.103667][T13039] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 501.109537][T13039] RIP: 0033:0x7f56bea8e929 [ 501.113932][T13039] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 501.133518][T13039] RSP: 002b:00007f56bd0d6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 501.141913][T13039] RAX: ffffffffffffffda RBX: 00007f56becb6080 RCX: 00007f56bea8e929 [ 501.149862][T13039] RDX: 0000000000000048 RSI: 00002000000009c0 RDI: 0000000000000000 [ 501.157813][T13039] RBP: 00007f56bd0d6090 R08: 0000000000000000 R09: 0000000000000000 [ 501.165764][T13039] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 501.173718][T13039] R13: 0000000000000000 R14: 00007f56becb6080 R15: 00007ffe3fa80c38 [ 501.459668][T13068] device sit0 left promiscuous mode [ 504.212564][T13138] device veth1_macvtap left promiscuous mode [ 504.218591][T13138] device macsec0 left promiscuous mode [ 504.655958][T13155] device sit0 entered promiscuous mode [ 508.967756][T13297] device pim6reg1 entered promiscuous mode [ 509.211238][T13310] device sit0 left promiscuous mode [ 510.141478][T13338] FAULT_INJECTION: forcing a failure. [ 510.141478][T13338] name failslab, interval 1, probability 0, space 0, times 0 [ 510.249643][T13338] CPU: 1 PID: 13338 Comm: syz.0.4494 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 510.261042][T13338] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 510.271093][T13338] Call Trace: [ 510.274389][T13338] __dump_stack+0x21/0x24 [ 510.278709][T13338] dump_stack_lvl+0x169/0x1d8 [ 510.283385][T13338] ? show_regs_print_info+0x18/0x18 [ 510.288576][T13338] ? vscnprintf+0x80/0x80 [ 510.292902][T13338] dump_stack+0x15/0x1c [ 510.297052][T13338] should_fail+0x3c1/0x510 [ 510.301546][T13338] ? traceprobe_set_print_fmt+0x62/0xd0 [ 510.307089][T13338] __should_failslab+0xa4/0xe0 [ 510.311849][T13338] should_failslab+0x9/0x20 [ 510.316356][T13338] __kmalloc+0x60/0x330 [ 510.320506][T13338] traceprobe_set_print_fmt+0x62/0xd0 [ 510.325865][T13338] create_local_trace_uprobe+0x528/0x6c0 [ 510.331487][T13338] ? perf_uprobe_init+0x62/0x1a0 [ 510.336421][T13338] ? bpf_get_uprobe_info+0x4e0/0x4e0 [ 510.341701][T13338] ? __kasan_check_write+0x14/0x20 [ 510.346804][T13338] ? _copy_from_user+0x95/0xd0 [ 510.351562][T13338] perf_uprobe_init+0xf9/0x1a0 [ 510.356323][T13338] perf_uprobe_event_init+0x10b/0x190 [ 510.361688][T13338] perf_try_init_event+0x14a/0x430 [ 510.366787][T13338] perf_event_alloc+0xcda/0x1990 [ 510.371724][T13338] __se_sys_perf_event_open+0x6f7/0x1b10 [ 510.377357][T13338] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 510.382994][T13338] ? fpu__clear_all+0x20/0x20 [ 510.387666][T13338] __x64_sys_perf_event_open+0xbf/0xd0 [ 510.393117][T13338] do_syscall_64+0x31/0x40 [ 510.397529][T13338] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 510.403419][T13338] RIP: 0033:0x7fc1a3cd8929 [ 510.407829][T13338] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 510.427434][T13338] RSP: 002b:00007fc1a2341038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 510.435847][T13338] RAX: ffffffffffffffda RBX: 00007fc1a3efffa0 RCX: 00007fc1a3cd8929 [ 510.443816][T13338] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000001080 [ 510.451789][T13338] RBP: 00007fc1a2341090 R08: 0000000000000000 R09: 0000000000000000 [ 510.459757][T13338] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000002 [ 510.467720][T13338] R13: 0000000000000000 R14: 00007fc1a3efffa0 R15: 00007ffd2dcf0cb8 [ 513.664241][T13471] device sit0 left promiscuous mode [ 513.698270][T13471] device sit0 entered promiscuous mode [ 515.161038][T13514] device sit0 left promiscuous mode [ 515.502486][T13517] bridge0: port 3(veth0) entered blocking state [ 515.508862][T13517] bridge0: port 3(veth0) entered disabled state [ 515.516601][T13517] device veth0 entered promiscuous mode [ 515.589381][T13517] bridge0: port 3(veth0) entered blocking state [ 515.595705][T13517] bridge0: port 3(veth0) entered listening state [ 515.840409][T13530] syz.2.4561[13530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 515.840499][T13530] syz.2.4561[13530] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 518.428041][T13579] device syzkaller0 entered promiscuous mode [ 521.155789][T13640] ªªªªªª: renamed from vlan0 [ 522.069643][T13671] device sit0 left promiscuous mode [ 522.246223][T13674] device sit0 entered promiscuous mode [ 523.045464][T13701] device sit0 left promiscuous mode [ 523.240051][T13704] device sit0 entered promiscuous mode [ 523.541147][T13710] device sit0 left promiscuous mode [ 523.981864][T13718] device sit0 left promiscuous mode [ 523.993949][T13721] device sit0 entered promiscuous mode [ 524.100917][T13732] device sit0 entered promiscuous mode [ 525.736574][T13760] device syzkaller0 entered promiscuous mode [ 526.289515][T13779] device sit0 entered promiscuous mode [ 527.639494][ T24] audit: type=1400 audit(1749586516.689:154): avc: denied { create } for pid=13786 comm="syz.2.4643" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 528.002195][T13807] device wg2 left promiscuous mode [ 528.078565][T13810] device sit0 left promiscuous mode [ 528.314377][T13807] device wg2 entered promiscuous mode [ 530.400497][T13860] device sit0 entered promiscuous mode [ 531.142193][ C0] bridge0: port 3(veth0) entered learning state [ 531.197466][T13861] device wg2 left promiscuous mode [ 531.213357][T13863] device wg2 entered promiscuous mode [ 531.311381][T13890] FAULT_INJECTION: forcing a failure. [ 531.311381][T13890] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 531.415799][T13890] CPU: 0 PID: 13890 Comm: syz.3.4678 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 531.427202][T13890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 531.437248][T13890] Call Trace: [ 531.440524][T13890] __dump_stack+0x21/0x24 [ 531.444833][T13890] dump_stack_lvl+0x169/0x1d8 [ 531.449498][T13890] ? thaw_kernel_threads+0x220/0x220 [ 531.454766][T13890] ? show_regs_print_info+0x18/0x18 [ 531.459948][T13890] dump_stack+0x15/0x1c [ 531.464089][T13890] should_fail+0x3c1/0x510 [ 531.468522][T13890] should_fail_usercopy+0x1a/0x20 [ 531.473547][T13890] _copy_from_iter+0x1d1/0x9f0 [ 531.478402][T13890] ? __check_object_size+0x2f4/0x3c0 [ 531.483683][T13890] kernfs_fop_write_iter+0x1a1/0x400 [ 531.488948][T13890] ? iov_iter_init+0x3f/0x120 [ 531.493604][T13890] vfs_write+0x725/0xd60 [ 531.497828][T13890] ? __kasan_slab_free+0x11/0x20 [ 531.502752][T13890] ? kernel_write+0x3c0/0x3c0 [ 531.507416][T13890] ? mutex_trylock+0xa0/0xa0 [ 531.511987][T13890] ? __fget_files+0x2c4/0x320 [ 531.516640][T13890] ? __fdget_pos+0x2d2/0x380 [ 531.521208][T13890] ? ksys_write+0x71/0x240 [ 531.525604][T13890] ksys_write+0x140/0x240 [ 531.529911][T13890] ? __ia32_sys_read+0x90/0x90 [ 531.534658][T13890] ? fpu__clear_all+0x20/0x20 [ 531.539317][T13890] __x64_sys_write+0x7b/0x90 [ 531.543895][T13890] do_syscall_64+0x31/0x40 [ 531.548297][T13890] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 531.554171][T13890] RIP: 0033:0x7f882ff09929 [ 531.558569][T13890] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 531.578270][T13890] RSP: 002b:00007f882e572038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 531.586668][T13890] RAX: ffffffffffffffda RBX: 00007f8830130fa0 RCX: 00007f882ff09929 [ 531.594620][T13890] RDX: 0000000000000001 RSI: 0000200000000040 RDI: 000000000000000a [ 531.602572][T13890] RBP: 00007f882e572090 R08: 0000000000000000 R09: 0000000000000000 [ 531.610524][T13890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 531.618478][T13890] R13: 0000000000000000 R14: 00007f8830130fa0 R15: 00007fff0aea2778 [ 532.233417][T13914] device sit0 entered promiscuous mode [ 535.644170][T13984] device sit0 left promiscuous mode [ 536.291120][T14001] device syzkaller0 entered promiscuous mode [ 539.791516][T14083] syz.2.4743[14083] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 539.791593][T14083] syz.2.4743[14083] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 539.815785][T14077] device sit0 left promiscuous mode [ 539.855807][T14079] device sit0 entered promiscuous mode [ 540.109370][T14093] device sit0 entered promiscuous mode [ 541.737431][T14133] FAULT_INJECTION: forcing a failure. [ 541.737431][T14133] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 541.769289][T14133] CPU: 1 PID: 14133 Comm: syz.2.4758 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 541.780672][T14133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 541.790713][T14133] Call Trace: [ 541.793996][T14133] __dump_stack+0x21/0x24 [ 541.798323][T14133] dump_stack_lvl+0x169/0x1d8 [ 541.802989][T14133] ? show_regs_print_info+0x18/0x18 [ 541.808189][T14133] dump_stack+0x15/0x1c [ 541.812334][T14133] should_fail+0x3c1/0x510 [ 541.816743][T14133] should_fail_alloc_page+0x4f/0x60 [ 541.821931][T14133] __alloc_pages_nodemask+0x109/0x5f0 [ 541.827294][T14133] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 541.833351][T14133] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 541.838891][T14133] ? _raw_spin_trylock_bh+0x130/0x130 [ 541.844255][T14133] __get_free_pages+0xe/0x30 [ 541.848835][T14133] kasan_populate_vmalloc_pte+0x29/0x120 [ 541.854467][T14133] __apply_to_page_range+0x74e/0x9e0 [ 541.859743][T14133] ? kasan_populate_vmalloc+0x70/0x70 [ 541.865110][T14133] ? kasan_populate_vmalloc+0x70/0x70 [ 541.870474][T14133] apply_to_page_range+0x3b/0x50 [ 541.875399][T14133] kasan_populate_vmalloc+0x60/0x70 [ 541.880619][T14133] alloc_vmap_area+0x1734/0x1870 [ 541.885554][T14133] ? vm_map_ram+0x9c0/0x9c0 [ 541.890071][T14133] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 541.895604][T14133] ? __get_vm_area_node+0x113/0x450 [ 541.900790][T14133] __get_vm_area_node+0x147/0x450 [ 541.905810][T14133] __vmalloc_node_range+0xe0/0x780 [ 541.910907][T14133] ? htab_map_alloc+0x4b6/0x970 [ 541.915757][T14133] bpf_map_area_alloc+0xd5/0xe0 [ 541.920597][T14133] ? htab_map_alloc+0x4b6/0x970 [ 541.925431][T14133] htab_map_alloc+0x4b6/0x970 [ 541.930097][T14133] map_create+0x441/0x2190 [ 541.934500][T14133] __se_sys_bpf+0x203/0x680 [ 541.938989][T14133] ? __x64_sys_bpf+0x90/0x90 [ 541.943577][T14133] ? fpu__clear_all+0x20/0x20 [ 541.948243][T14133] __x64_sys_bpf+0x7b/0x90 [ 541.952646][T14133] do_syscall_64+0x31/0x40 [ 541.957053][T14133] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 541.962932][T14133] RIP: 0033:0x7fb3d862e929 [ 541.967337][T14133] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 541.986936][T14133] RSP: 002b:00007fb3d6c76038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 541.995338][T14133] RAX: ffffffffffffffda RBX: 00007fb3d8856080 RCX: 00007fb3d862e929 [ 542.003298][T14133] RDX: 0000000000000048 RSI: 00002000000009c0 RDI: 0000000000000000 [ 542.011256][T14133] RBP: 00007fb3d6c76090 R08: 0000000000000000 R09: 0000000000000000 [ 542.019212][T14133] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 542.027180][T14133] R13: 0000000000000000 R14: 00007fb3d8856080 R15: 00007ffeaa2b77f8 [ 542.104483][T14134] device sit0 left promiscuous mode [ 542.518204][T14141] device sit0 left promiscuous mode [ 542.786449][T14144] device sit0 entered promiscuous mode [ 543.694861][T14171] device veth1_macvtap left promiscuous mode [ 544.964269][T14227] device sit0 left promiscuous mode [ 546.095180][T14247] device sit0 left promiscuous mode [ 546.499762][ C0] bridge0: port 3(veth0) entered forwarding state [ 546.506330][ C0] bridge0: topology change detected, propagating [ 546.619585][T14272] device sit0 entered promiscuous mode [ 547.446006][T14279] device sit0 left promiscuous mode [ 548.579321][T14318] device sit0 entered promiscuous mode [ 550.279200][ T24] audit: type=1400 audit(1749586539.329:155): avc: denied { create } for pid=14341 comm="syz.0.4835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 550.814789][T14373] device sit0 left promiscuous mode [ 551.995731][T14382] device syzkaller0 entered promiscuous mode [ 552.020336][T14393] Â: renamed from pim6reg1 [ 555.460043][T14537] device syzkaller0 entered promiscuous mode [ 555.741889][T14566] device sit0 left promiscuous mode [ 555.918067][T14566] device sit0 entered promiscuous mode [ 557.354162][T14618] bridge0: port 2(bridge_slave_1) entered disabled state [ 557.361389][T14618] bridge0: port 1(bridge_slave_0) entered disabled state [ 559.043653][T14659] device sit0 left promiscuous mode [ 559.949921][T14663] device sit0 entered promiscuous mode [ 560.166411][T14682] device sit0 left promiscuous mode [ 563.360329][T14795] device pim6reg1 entered promiscuous mode [ 564.284454][T14818] device pim6reg1 entered promiscuous mode [ 564.530710][T14832] device wg2 left promiscuous mode [ 564.989099][T14845] device sit0 entered promiscuous mode [ 566.477372][T14906] FAULT_INJECTION: forcing a failure. [ 566.477372][T14906] name failslab, interval 1, probability 0, space 0, times 0 [ 566.564875][T14906] CPU: 0 PID: 14906 Comm: syz.0.5040 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 566.576273][T14906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 566.586325][T14906] Call Trace: [ 566.589622][T14906] __dump_stack+0x21/0x24 [ 566.593948][T14906] dump_stack_lvl+0x169/0x1d8 [ 566.598613][T14906] ? thaw_kernel_threads+0x220/0x220 [ 566.603890][T14906] ? show_regs_print_info+0x18/0x18 [ 566.609082][T14906] dump_stack+0x15/0x1c [ 566.613229][T14906] should_fail+0x3c1/0x510 [ 566.617627][T14906] ? __build_skb+0x2d/0x310 [ 566.622107][T14906] __should_failslab+0xa4/0xe0 [ 566.626849][T14906] should_failslab+0x9/0x20 [ 566.631330][T14906] kmem_cache_alloc+0x3d/0x2e0 [ 566.636070][T14906] __build_skb+0x2d/0x310 [ 566.640376][T14906] build_skb+0x24/0x200 [ 566.644509][T14906] ? tun_get_user+0x7ff/0x3090 [ 566.649279][T14906] tun_get_user+0x818/0x3090 [ 566.653852][T14906] ? tun_do_read+0x1c00/0x1c00 [ 566.658592][T14906] ? kstrtouint_from_user+0x1a0/0x200 [ 566.663941][T14906] ? __fsnotify_parent+0x5f5/0x6c0 [ 566.669027][T14906] ? avc_policy_seqno+0x1b/0x70 [ 566.673854][T14906] ? selinux_file_permission+0x2a5/0x510 [ 566.679464][T14906] ? fsnotify_perm+0x66/0x4b0 [ 566.684120][T14906] tun_chr_write_iter+0x1bf/0x270 [ 566.689121][T14906] vfs_write+0x725/0xd60 [ 566.693339][T14906] ? __bpf_trace_kmem_free+0x6f/0x90 [ 566.698601][T14906] ? kernel_write+0x3c0/0x3c0 [ 566.703256][T14906] ? __fget_files+0x2c4/0x320 [ 566.707921][T14906] ? __fdget_pos+0x1f7/0x380 [ 566.712489][T14906] ? ksys_write+0x71/0x240 [ 566.716881][T14906] ksys_write+0x140/0x240 [ 566.721185][T14906] ? __ia32_sys_read+0x90/0x90 [ 566.725926][T14906] ? fpu__clear_all+0x20/0x20 [ 566.730600][T14906] __x64_sys_write+0x7b/0x90 [ 566.735190][T14906] do_syscall_64+0x31/0x40 [ 566.739591][T14906] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 566.745458][T14906] RIP: 0033:0x7fc1a3cd8929 [ 566.749850][T14906] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 566.769432][T14906] RSP: 002b:00007fc1a2341038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 566.777847][T14906] RAX: ffffffffffffffda RBX: 00007fc1a3efffa0 RCX: 00007fc1a3cd8929 [ 566.785795][T14906] RDX: 0000000000000015 RSI: 0000200000000000 RDI: 00000000000000c8 [ 566.793745][T14906] RBP: 00007fc1a2341090 R08: 0000000000000000 R09: 0000000000000000 [ 566.801694][T14906] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 566.809642][T14906] R13: 0000000000000000 R14: 00007fc1a3efffa0 R15: 00007ffd2dcf0cb8 [ 567.555840][T14940] device sit0 left promiscuous mode [ 567.566811][T14942] device sit0 entered promiscuous mode [ 569.771613][T15018] device sit0 left promiscuous mode [ 569.921505][T15019] device sit0 entered promiscuous mode [ 570.042783][T15026] FAULT_INJECTION: forcing a failure. [ 570.042783][T15026] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 570.055993][T15026] CPU: 1 PID: 15026 Comm: syz.3.5081 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 570.067352][T15026] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 570.077408][T15026] Call Trace: [ 570.080703][T15026] __dump_stack+0x21/0x24 [ 570.085033][T15026] dump_stack_lvl+0x169/0x1d8 [ 570.089699][T15026] ? thaw_kernel_threads+0x220/0x220 [ 570.094966][T15026] ? vsnprintf+0x1871/0x1960 [ 570.099542][T15026] ? show_regs_print_info+0x18/0x18 [ 570.104741][T15026] dump_stack+0x15/0x1c [ 570.108891][T15026] should_fail+0x3c1/0x510 [ 570.113299][T15026] should_fail_usercopy+0x1a/0x20 [ 570.118311][T15026] _copy_to_user+0x20/0x90 [ 570.122717][T15026] simple_read_from_buffer+0xe9/0x160 [ 570.128077][T15026] proc_fail_nth_read+0x19a/0x210 [ 570.133090][T15026] ? proc_fault_inject_write+0x2f0/0x2f0 [ 570.138713][T15026] ? rw_verify_area+0x1c0/0x360 [ 570.143555][T15026] ? proc_fault_inject_write+0x2f0/0x2f0 [ 570.149179][T15026] vfs_read+0x1fe/0xa10 [ 570.153322][T15026] ? kernel_read+0x70/0x70 [ 570.157728][T15026] ? __kasan_check_write+0x14/0x20 [ 570.162829][T15026] ? mutex_lock+0x8c/0xe0 [ 570.167147][T15026] ? mutex_trylock+0xa0/0xa0 [ 570.171723][T15026] ? __fget_files+0x2c4/0x320 [ 570.176394][T15026] ? __fdget_pos+0x2d2/0x380 [ 570.180971][T15026] ? ksys_read+0x71/0x240 [ 570.185292][T15026] ksys_read+0x140/0x240 [ 570.189583][T15026] ? vfs_write+0xd60/0xd60 [ 570.193998][T15026] ? fpu__clear_all+0x20/0x20 [ 570.198669][T15026] __x64_sys_read+0x7b/0x90 [ 570.203165][T15026] do_syscall_64+0x31/0x40 [ 570.207571][T15026] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 570.213446][T15026] RIP: 0033:0x7f882ff0833c [ 570.217852][T15026] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 570.237447][T15026] RSP: 002b:00007f882e572030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 570.245855][T15026] RAX: ffffffffffffffda RBX: 00007f8830130fa0 RCX: 00007f882ff0833c [ 570.253815][T15026] RDX: 000000000000000f RSI: 00007f882e5720a0 RDI: 0000000000000007 [ 570.261775][T15026] RBP: 00007f882e572090 R08: 0000000000000000 R09: 0000000000000000 [ 570.269731][T15026] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 570.277689][T15026] R13: 0000000000000000 R14: 00007f8830130fa0 R15: 00007fff0aea2778 [ 570.497987][T15040] FAULT_INJECTION: forcing a failure. [ 570.497987][T15040] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 570.561699][T15040] CPU: 0 PID: 15040 Comm: syz.3.5086 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 570.573092][T15040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 570.583142][T15040] Call Trace: [ 570.586960][T15040] __dump_stack+0x21/0x24 [ 570.591299][T15040] dump_stack_lvl+0x169/0x1d8 [ 570.595977][T15040] ? show_regs_print_info+0x18/0x18 [ 570.601172][T15040] ? vfs_write+0xac8/0xd60 [ 570.605587][T15040] dump_stack+0x15/0x1c [ 570.609742][T15040] should_fail+0x3c1/0x510 [ 570.614160][T15040] should_fail_usercopy+0x1a/0x20 [ 570.619180][T15040] _copy_from_user+0x20/0xd0 [ 570.623768][T15040] __se_sys_bpf+0x181/0x680 [ 570.628276][T15040] ? __x64_sys_bpf+0x90/0x90 [ 570.632871][T15040] ? fpu__clear_all+0x20/0x20 [ 570.637532][T15040] __x64_sys_bpf+0x7b/0x90 [ 570.641944][T15040] do_syscall_64+0x31/0x40 [ 570.646345][T15040] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 570.652218][T15040] RIP: 0033:0x7f882ff09929 [ 570.656613][T15040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 570.676211][T15040] RSP: 002b:00007f882e572038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 570.684612][T15040] RAX: ffffffffffffffda RBX: 00007f8830130fa0 RCX: 00007f882ff09929 [ 570.692561][T15040] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000015 [ 570.700521][T15040] RBP: 00007f882e572090 R08: 0000000000000000 R09: 0000000000000000 [ 570.708475][T15040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 570.716427][T15040] R13: 0000000000000000 R14: 00007f8830130fa0 R15: 00007fff0aea2778 [ 570.985048][T15054] device sit0 left promiscuous mode [ 571.638258][T15088] device sit0 entered promiscuous mode [ 572.318452][T15107] device sit0 entered promiscuous mode [ 576.597140][T15168] device sit0 left promiscuous mode [ 576.935356][T15169] device sit0 entered promiscuous mode [ 577.951836][T15183] device sit0 left promiscuous mode [ 577.977081][T15185] device sit0 entered promiscuous mode [ 578.499067][T15193] FAULT_INJECTION: forcing a failure. [ 578.499067][T15193] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 578.529600][T15193] CPU: 0 PID: 15193 Comm: syz.4.5136 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 578.540996][T15193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 578.551049][T15193] Call Trace: [ 578.554341][T15193] __dump_stack+0x21/0x24 [ 578.558665][T15193] dump_stack_lvl+0x169/0x1d8 [ 578.563337][T15193] ? show_regs_print_info+0x18/0x18 [ 578.568527][T15193] ? slab_post_alloc_hook+0x5d/0x2f0 [ 578.573817][T15193] ? __alloc_skb+0x9e/0x520 [ 578.578321][T15193] ? alloc_skb_with_frags+0xa2/0x560 [ 578.583601][T15193] ? sock_alloc_send_pskb+0x853/0x980 [ 578.588968][T15193] ? tun_chr_write_iter+0x1bf/0x270 [ 578.594159][T15193] dump_stack+0x15/0x1c [ 578.598304][T15193] should_fail+0x3c1/0x510 [ 578.602717][T15193] should_fail_alloc_page+0x4f/0x60 [ 578.607907][T15193] __alloc_pages_nodemask+0x109/0x5f0 [ 578.613291][T15193] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 578.618835][T15193] kmalloc_order+0x4c/0x160 [ 578.623318][T15193] ? slab_post_alloc_hook+0x7d/0x2f0 [ 578.628579][T15193] kmalloc_order_trace+0x16/0x80 [ 578.633506][T15193] __kmalloc_track_caller+0x1d7/0x320 [ 578.638869][T15193] ? __alloc_skb+0x9e/0x520 [ 578.643354][T15193] ? alloc_skb_with_frags+0xa2/0x560 [ 578.648610][T15193] __alloc_skb+0xdc/0x520 [ 578.652930][T15193] alloc_skb_with_frags+0xa2/0x560 [ 578.658041][T15193] sock_alloc_send_pskb+0x853/0x980 [ 578.663241][T15193] ? is_bpf_text_address+0x177/0x190 [ 578.668525][T15193] ? __kernel_text_address+0xa0/0x100 [ 578.673889][T15193] ? sock_kzfree_s+0x60/0x60 [ 578.678470][T15193] ? stack_trace_save+0x98/0xe0 [ 578.683311][T15193] tun_get_user+0x4bd/0x3090 [ 578.687894][T15193] ? __x64_sys_openat+0x136/0x160 [ 578.692919][T15193] ? tun_do_read+0x1c00/0x1c00 [ 578.697697][T15193] ? kstrtouint_from_user+0x1a0/0x200 [ 578.703063][T15193] ? __fsnotify_parent+0x5f5/0x6c0 [ 578.708170][T15193] ? avc_policy_seqno+0x1b/0x70 [ 578.713013][T15193] ? selinux_file_permission+0x2a5/0x510 [ 578.718639][T15193] ? fsnotify_perm+0x66/0x4b0 [ 578.723316][T15193] tun_chr_write_iter+0x1bf/0x270 [ 578.728345][T15193] vfs_write+0x725/0xd60 [ 578.732581][T15193] ? kernel_write+0x3c0/0x3c0 [ 578.737251][T15193] ? __fget_files+0x2c4/0x320 [ 578.741924][T15193] ? __fdget_pos+0x1f7/0x380 [ 578.746510][T15193] ? ksys_write+0x71/0x240 [ 578.751265][T15193] ksys_write+0x140/0x240 [ 578.755588][T15193] ? __ia32_sys_read+0x90/0x90 [ 578.760346][T15193] ? fpu__clear_all+0x20/0x20 [ 578.765021][T15193] __x64_sys_write+0x7b/0x90 [ 578.769603][T15193] do_syscall_64+0x31/0x40 [ 578.774014][T15193] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 578.779895][T15193] RIP: 0033:0x7fdc90b03929 [ 578.784298][T15193] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 578.803894][T15193] RSP: 002b:00007fdc8f16c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 578.812306][T15193] RAX: ffffffffffffffda RBX: 00007fdc90d2afa0 RCX: 00007fdc90b03929 [ 578.820268][T15193] RDX: 000000000000fdef RSI: 0000200000000300 RDI: 00000000000000c8 [ 578.828238][T15193] RBP: 00007fdc8f16c090 R08: 0000000000000000 R09: 0000000000000000 [ 578.836204][T15193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 578.844169][T15193] R13: 0000000000000000 R14: 00007fdc90d2afa0 R15: 00007ffcfc1e4c48 [ 579.521535][T15223] device sit0 entered promiscuous mode [ 580.200121][T15240] device sit0 left promiscuous mode [ 580.280291][T15243] device sit0 entered promiscuous mode [ 580.534823][T15249] device sit0 left promiscuous mode [ 580.547822][T15252] device sit0 entered promiscuous mode [ 581.866251][T15291] device sit0 left promiscuous mode [ 582.163460][T15294] device sit0 entered promiscuous mode [ 582.712373][T15302] device sit0 entered promiscuous mode [ 583.180607][T15309] device veth0_vlan left promiscuous mode [ 583.196756][T15309] device veth0_vlan entered promiscuous mode [ 583.220163][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 583.238849][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 583.287498][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 584.227551][T15346] bridge0: port 1(bridge_slave_0) entered disabled state [ 587.019617][T15490] FAULT_INJECTION: forcing a failure. [ 587.019617][T15490] name failslab, interval 1, probability 0, space 0, times 0 [ 587.177096][T15490] CPU: 0 PID: 15490 Comm: syz.4.5237 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 587.188498][T15490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 587.198550][T15490] Call Trace: [ 587.201845][T15490] __dump_stack+0x21/0x24 [ 587.206174][T15490] dump_stack_lvl+0x169/0x1d8 [ 587.210849][T15490] ? show_regs_print_info+0x18/0x18 [ 587.216045][T15490] dump_stack+0x15/0x1c [ 587.220197][T15490] should_fail+0x3c1/0x510 [ 587.224612][T15490] ? alloc_vmap_area+0x16b/0x1870 [ 587.229653][T15490] __should_failslab+0xa4/0xe0 [ 587.234413][T15490] should_failslab+0x9/0x20 [ 587.238913][T15490] kmem_cache_alloc+0x3d/0x2e0 [ 587.243680][T15490] alloc_vmap_area+0x16b/0x1870 [ 587.248533][T15490] ? vm_map_ram+0x9c0/0x9c0 [ 587.253034][T15490] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 587.258579][T15490] ? __get_vm_area_node+0x113/0x450 [ 587.263775][T15490] __get_vm_area_node+0x147/0x450 [ 587.268794][T15490] __vmalloc_node_range+0xe0/0x780 [ 587.273903][T15490] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 587.279455][T15490] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 587.284997][T15490] __vmalloc+0x79/0x90 [ 587.289061][T15490] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 587.294605][T15490] bpf_prog_alloc_no_stats+0x3b/0x250 [ 587.299970][T15490] ? bpf_prog_alloc+0x17/0x1f0 [ 587.304726][T15490] bpf_prog_alloc+0x21/0x1f0 [ 587.309306][T15490] bpf_prog_load+0x71d/0x1420 [ 587.313976][T15490] ? map_freeze+0x320/0x320 [ 587.318479][T15490] ? selinux_bpf+0xc7/0xf0 [ 587.322890][T15490] ? security_bpf+0x82/0xa0 [ 587.327394][T15490] __se_sys_bpf+0x442/0x680 [ 587.331891][T15490] ? __x64_sys_bpf+0x90/0x90 [ 587.336485][T15490] ? fpu__clear_all+0x20/0x20 [ 587.341156][T15490] __x64_sys_bpf+0x7b/0x90 [ 587.345569][T15490] do_syscall_64+0x31/0x40 [ 587.349987][T15490] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 587.355871][T15490] RIP: 0033:0x7fdc90b03929 [ 587.360284][T15490] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 587.379887][T15490] RSP: 002b:00007fdc8f16c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 587.388306][T15490] RAX: ffffffffffffffda RBX: 00007fdc90d2afa0 RCX: 00007fdc90b03929 [ 587.396273][T15490] RDX: 0000000000000090 RSI: 0000200000002c40 RDI: 0000000000000005 [ 587.404243][T15490] RBP: 00007fdc8f16c090 R08: 0000000000000000 R09: 0000000000000000 [ 587.412222][T15490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 587.420191][T15490] R13: 0000000000000001 R14: 00007fdc90d2afa0 R15: 00007ffcfc1e4c48 [ 587.430379][T15490] syz.4.5237: vmalloc: allocation failure: 4096 bytes, mode:0x100dc0(GFP_USER|__GFP_ZERO), nodemask=(null),cpuset=syz4,mems_allowed=0 [ 587.444544][T15490] CPU: 0 PID: 15490 Comm: syz.4.5237 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 587.455915][T15490] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 587.465983][T15490] Call Trace: [ 587.469277][T15490] __dump_stack+0x21/0x24 [ 587.473605][T15490] dump_stack_lvl+0x169/0x1d8 [ 587.478289][T15490] ? show_regs_print_info+0x18/0x18 [ 587.483489][T15490] ? pr_cont_kernfs_name+0xe3/0xf0 [ 587.488603][T15490] dump_stack+0x15/0x1c [ 587.492753][T15490] warn_alloc+0x1b0/0x1d0 [ 587.497080][T15490] ? slab_free_freelist_hook+0xc5/0x190 [ 587.502626][T15490] ? zone_watermark_ok_safe+0x250/0x250 [ 587.508171][T15490] ? __get_vm_area_node+0x15c/0x450 [ 587.513367][T15490] __vmalloc_node_range+0x27d/0x780 [ 587.518565][T15490] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 587.524110][T15490] __vmalloc+0x79/0x90 [ 587.528183][T15490] ? bpf_prog_alloc_no_stats+0x3b/0x250 [ 587.533746][T15490] bpf_prog_alloc_no_stats+0x3b/0x250 [ 587.539121][T15490] ? bpf_prog_alloc+0x17/0x1f0 [ 587.543881][T15490] bpf_prog_alloc+0x21/0x1f0 [ 587.548467][T15490] bpf_prog_load+0x71d/0x1420 [ 587.553145][T15490] ? map_freeze+0x320/0x320 [ 587.557649][T15490] ? selinux_bpf+0xc7/0xf0 [ 587.562073][T15490] ? security_bpf+0x82/0xa0 [ 587.566569][T15490] __se_sys_bpf+0x442/0x680 [ 587.571067][T15490] ? __x64_sys_bpf+0x90/0x90 [ 587.575657][T15490] ? fpu__clear_all+0x20/0x20 [ 587.580344][T15490] __x64_sys_bpf+0x7b/0x90 [ 587.584755][T15490] do_syscall_64+0x31/0x40 [ 587.589172][T15490] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 587.595057][T15490] RIP: 0033:0x7fdc90b03929 [ 587.599465][T15490] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 587.619066][T15490] RSP: 002b:00007fdc8f16c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 587.627477][T15490] RAX: ffffffffffffffda RBX: 00007fdc90d2afa0 RCX: 00007fdc90b03929 [ 587.635445][T15490] RDX: 0000000000000090 RSI: 0000200000002c40 RDI: 0000000000000005 [ 587.643415][T15490] RBP: 00007fdc8f16c090 R08: 0000000000000000 R09: 0000000000000000 [ 587.651383][T15490] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 587.659354][T15490] R13: 0000000000000001 R14: 00007fdc90d2afa0 R15: 00007ffcfc1e4c48 [ 587.839567][T15490] Mem-Info: [ 587.842822][T15490] active_anon:37 inactive_anon:8209 isolated_anon:0 [ 587.842822][T15490] active_file:25468 inactive_file:3263 isolated_file:0 [ 587.842822][T15490] unevictable:0 dirty:270 writeback:0 [ 587.842822][T15490] slab_reclaimable:7684 slab_unreclaimable:75283 [ 587.842822][T15490] mapped:29931 shmem:162 pagetables:615 bounce:0 [ 587.842822][T15490] free:1557491 free_pcp:1096 free_cma:0 [ 587.885077][T15490] Node 0 active_anon:148kB inactive_anon:33052kB active_file:101872kB inactive_file:13052kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:119636kB dirty:1084kB writeback:0kB shmem:648kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4736kB all_unreclaimable? no [ 587.939306][T15490] DMA32 free:2985936kB min:62668kB low:78332kB high:93996kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2988828kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:2892kB local_pcp:1400kB free_cma:0kB [ 587.989873][T15490] lowmem_reserve[]: 0 3941 3941 [ 587.995830][T15490] Normal free:3248528kB min:84784kB low:105980kB high:127176kB reserved_highatomic:0KB active_anon:148kB inactive_anon:27252kB active_file:101872kB inactive_file:13052kB unevictable:0kB writepending:1084kB present:5242880kB managed:4036368kB mlocked:0kB pagetables:2488kB bounce:0kB free_pcp:1932kB local_pcp:1376kB free_cma:0kB [ 588.216637][T15490] lowmem_reserve[]: 0 0 0 [ 588.239635][T15490] DMA32: 8*4kB (UM) 2*8kB (M) 4*16kB (M) 7*32kB (UM) 8*64kB (UM) 7*128kB (UM) 7*256kB (UM) 5*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 725*4096kB (M) = 2985936kB [ 588.360662][T15516] device sit0 left promiscuous mode [ 588.379563][T15490] Normal: 1083*4kB (UME) 718*8kB (UME) 1029*16kB (UME) 1079*32kB (UME) 282*64kB (UME) 100*128kB (UME) 88*256kB (UME) 57*512kB (UM) 36*1024kB (UM) 15*2048kB (ME) 742*4096kB (UM) = 3250444kB [ 588.499679][T15516] device sit0 entered promiscuous mode [ 588.629538][T15490] 28893 total pagecache pages [ 588.689522][T15490] 0 pages in swap cache [ 588.693707][T15490] Swap cache stats: add 0, delete 0, find 0/0 [ 588.851343][T15490] Free swap = 124996kB [ 588.907803][T15490] Total swap = 124996kB [ 588.967162][T15490] 2097051 pages RAM [ 589.019795][T15490] 0 pages HighMem/MovableOnly [ 589.078321][T15490] 340752 pages reserved [ 589.133549][T15490] 0 pages cma reserved [ 589.875911][T15549] device sit0 left promiscuous mode [ 589.972052][T15557] device sit0 left promiscuous mode [ 589.988409][T15549] device sit0 entered promiscuous mode [ 590.782064][T15557] device sit0 entered promiscuous mode [ 591.320365][T15592] FAULT_INJECTION: forcing a failure. [ 591.320365][T15592] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 591.381339][T15599] device sit0 left promiscuous mode [ 591.419574][T15592] CPU: 1 PID: 15592 Comm: syz.1.5272 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 591.430958][T15592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 591.441007][T15592] Call Trace: [ 591.444301][T15592] __dump_stack+0x21/0x24 [ 591.448618][T15592] dump_stack_lvl+0x169/0x1d8 [ 591.453293][T15592] ? show_regs_print_info+0x18/0x18 [ 591.458491][T15592] ? vfs_write+0xac8/0xd60 [ 591.462912][T15592] dump_stack+0x15/0x1c [ 591.467064][T15592] should_fail+0x3c1/0x510 [ 591.471472][T15592] should_fail_usercopy+0x1a/0x20 [ 591.476500][T15592] _copy_from_user+0x20/0xd0 [ 591.481084][T15592] __se_sys_bpf+0x181/0x680 [ 591.485586][T15592] ? __x64_sys_bpf+0x90/0x90 [ 591.490172][T15592] ? fpu__clear_all+0x20/0x20 [ 591.494847][T15592] __x64_sys_bpf+0x7b/0x90 [ 591.499254][T15592] do_syscall_64+0x31/0x40 [ 591.503676][T15592] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 591.509560][T15592] RIP: 0033:0x7f56bea8e929 [ 591.513967][T15592] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 591.528130][T15599] device sit0 entered promiscuous mode [ 591.533565][T15592] RSP: 002b:00007f56bd0f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 591.533578][T15592] RAX: ffffffffffffffda RBX: 00007f56becb5fa0 RCX: 00007f56bea8e929 [ 591.533584][T15592] RDX: 0000000000000020 RSI: 0000200000000000 RDI: 0000000000000002 [ 591.533590][T15592] RBP: 00007f56bd0f7090 R08: 0000000000000000 R09: 0000000000000000 [ 591.533594][T15592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 591.533600][T15592] R13: 0000000000000000 R14: 00007f56becb5fa0 R15: 00007ffe3fa80c38 [ 592.432285][T15617] FAULT_INJECTION: forcing a failure. [ 592.432285][T15617] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 592.508391][T15617] CPU: 1 PID: 15617 Comm: syz.4.5282 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 592.519790][T15617] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 592.529996][T15617] Call Trace: [ 592.533280][T15617] __dump_stack+0x21/0x24 [ 592.537586][T15617] dump_stack_lvl+0x169/0x1d8 [ 592.542247][T15617] ? show_regs_print_info+0x18/0x18 [ 592.547428][T15617] ? stack_trace_save+0x98/0xe0 [ 592.552264][T15617] dump_stack+0x15/0x1c [ 592.556402][T15617] should_fail+0x3c1/0x510 [ 592.560802][T15617] should_fail_alloc_page+0x4f/0x60 [ 592.565979][T15617] __alloc_pages_nodemask+0x109/0x5f0 [ 592.571336][T15617] ? rotate_reclaimable_page+0x4a0/0x4a0 [ 592.576949][T15617] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 592.582479][T15617] ? __mod_node_page_state+0x9e/0xd0 [ 592.587743][T15617] ? lru_cache_add+0x164/0x380 [ 592.592490][T15617] ? __lru_cache_add_inactive_or_unevictable+0x38/0x160 [ 592.599407][T15617] wp_page_copy+0x1d0/0x15d0 [ 592.603978][T15617] ? stack_trace_save+0xe0/0xe0 [ 592.608837][T15617] ? trace_spf_pte_lock+0x110/0x110 [ 592.614025][T15617] ? __set_page_owner+0x3b/0x2a0 [ 592.618944][T15617] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 592.624989][T15617] do_wp_page+0x9a6/0xc80 [ 592.629299][T15617] handle_pte_fault+0xac1/0x3750 [ 592.634219][T15617] handle_mm_fault+0xf3f/0x16a0 [ 592.639048][T15617] ? prep_new_page+0x10c/0x180 [ 592.643791][T15617] ? can_reuse_spf_vma+0xe0/0xe0 [ 592.648710][T15617] ? __kasan_check_write+0x14/0x20 [ 592.653800][T15617] ? down_read_trylock+0x100/0x150 [ 592.658889][T15617] ? __init_rwsem+0x1c0/0x1c0 [ 592.663544][T15617] ? find_vma+0x30/0x150 [ 592.667766][T15617] do_user_addr_fault+0x5a2/0xc80 [ 592.672772][T15617] ? do_kern_addr_fault+0x80/0x80 [ 592.677774][T15617] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 592.683212][T15617] ? _raw_spin_lock+0xe0/0xe0 [ 592.687872][T15617] exc_page_fault+0x5a/0xc0 [ 592.692358][T15617] asm_exc_page_fault+0x1e/0x30 [ 592.697200][T15617] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 592.703763][T15617] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 592.723357][T15617] RSP: 0018:ffffc90000ce7d40 EFLAGS: 00050206 [ 592.729408][T15617] RAX: ffffffff823a3c01 RBX: 000000000000b161 RCX: 00000000000078e1 [ 592.737361][T15617] RDX: 000000000000b161 RSI: ffff888118d43880 RDI: 0000200000005000 [ 592.745315][T15617] RBP: ffffc90000ce7d70 R08: 0000000000000001 R09: 0000000000000000 [ 592.753265][T15617] R10: ffffed10231a962c R11: 0000000000001628 R12: 00007ffffffff000 [ 592.761216][T15617] R13: 000020000000c8e1 R14: ffff888118d40000 R15: 0000200000001780 [ 592.769178][T15617] ? _copy_to_user+0x21/0x90 [ 592.773751][T15617] ? _copy_to_user+0x78/0x90 [ 592.778321][T15617] map_lookup_and_delete_elem+0x409/0x530 [ 592.784018][T15617] __se_sys_bpf+0x454/0x680 [ 592.788497][T15617] ? __x64_sys_bpf+0x90/0x90 [ 592.793065][T15617] ? fpu__clear_all+0x20/0x20 [ 592.797720][T15617] __x64_sys_bpf+0x7b/0x90 [ 592.802114][T15617] do_syscall_64+0x31/0x40 [ 592.806513][T15617] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 592.812387][T15617] RIP: 0033:0x7fdc90b03929 [ 592.816779][T15617] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 592.836364][T15617] RSP: 002b:00007fdc8f16c038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 592.844759][T15617] RAX: ffffffffffffffda RBX: 00007fdc90d2afa0 RCX: 00007fdc90b03929 [ 592.852710][T15617] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000015 [ 592.860659][T15617] RBP: 00007fdc8f16c090 R08: 0000000000000000 R09: 0000000000000000 [ 592.868699][T15617] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 592.876650][T15617] R13: 0000000000000000 R14: 00007fdc90d2afa0 R15: 00007ffcfc1e4c48 [ 594.164577][T15668] device sit0 left promiscuous mode [ 594.288029][T15672] device sit0 entered promiscuous mode [ 595.025999][T15676] FAULT_INJECTION: forcing a failure. [ 595.025999][T15676] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 595.219728][T15676] CPU: 1 PID: 15676 Comm: syz.2.5304 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 595.231141][T15676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 595.241183][T15676] Call Trace: [ 595.244457][T15676] __dump_stack+0x21/0x24 [ 595.248762][T15676] dump_stack_lvl+0x169/0x1d8 [ 595.253414][T15676] ? show_regs_print_info+0x18/0x18 [ 595.258588][T15676] dump_stack+0x15/0x1c [ 595.262722][T15676] should_fail+0x3c1/0x510 [ 595.267114][T15676] should_fail_usercopy+0x1a/0x20 [ 595.272124][T15676] _copy_from_iter+0x1d1/0x9f0 [ 595.276870][T15676] ? __kasan_check_read+0x11/0x20 [ 595.281876][T15676] ? __check_object_size+0x2f4/0x3c0 [ 595.287145][T15676] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 595.292841][T15676] ? irq_exit_rcu+0x9/0x10 [ 595.297235][T15676] ? sysvec_irq_work+0xc8/0xd0 [ 595.301978][T15676] ? skb_put+0x10e/0x1f0 [ 595.306199][T15676] tun_get_user+0x140a/0x3090 [ 595.310856][T15676] ? tun_do_read+0x1c00/0x1c00 [ 595.315597][T15676] ? kstrtouint_from_user+0x1a0/0x200 [ 595.320947][T15676] ? __fsnotify_parent+0x5f5/0x6c0 [ 595.326046][T15676] ? avc_policy_seqno+0x1b/0x70 [ 595.330875][T15676] ? selinux_file_permission+0x2a5/0x510 [ 595.336490][T15676] ? fsnotify_perm+0x66/0x4b0 [ 595.341148][T15676] tun_chr_write_iter+0x1bf/0x270 [ 595.346152][T15676] vfs_write+0x725/0xd60 [ 595.350372][T15676] ? __bpf_trace_kmem_free+0x6f/0x90 [ 595.355634][T15676] ? kernel_write+0x3c0/0x3c0 [ 595.360288][T15676] ? __fget_files+0x2c4/0x320 [ 595.364943][T15676] ? __fdget_pos+0x1f7/0x380 [ 595.369507][T15676] ? ksys_write+0x71/0x240 [ 595.373898][T15676] ksys_write+0x140/0x240 [ 595.378208][T15676] ? __ia32_sys_read+0x90/0x90 [ 595.382956][T15676] ? fpu__clear_all+0x20/0x20 [ 595.387616][T15676] __x64_sys_write+0x7b/0x90 [ 595.392184][T15676] do_syscall_64+0x31/0x40 [ 595.396584][T15676] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 595.402455][T15676] RIP: 0033:0x7fb3d862e929 [ 595.406850][T15676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 595.426439][T15676] RSP: 002b:00007fb3d6c97038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 595.434833][T15676] RAX: ffffffffffffffda RBX: 00007fb3d8855fa0 RCX: 00007fb3d862e929 [ 595.442786][T15676] RDX: 000000000000fdef RSI: 0000200000000200 RDI: 00000000000000c8 [ 595.450735][T15676] RBP: 00007fb3d6c97090 R08: 0000000000000000 R09: 0000000000000000 [ 595.458688][T15676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 595.466640][T15676] R13: 0000000000000000 R14: 00007fb3d8855fa0 R15: 00007ffeaa2b77f8 [ 596.919112][T15725] device sit0 left promiscuous mode [ 596.968770][T15730] device sit0 entered promiscuous mode [ 597.380211][T15747] device sit0 left promiscuous mode [ 597.436012][T15748] device sit0 left promiscuous mode [ 597.557213][T15752] device sit0 entered promiscuous mode [ 598.193526][T15747] device sit0 entered promiscuous mode [ 599.621453][T15804] device sit0 left promiscuous mode [ 599.718728][T15808] device sit0 left promiscuous mode [ 599.729716][T15804] device sit0 entered promiscuous mode [ 599.778450][T15808] device sit0 entered promiscuous mode [ 600.741236][T15835] device sit0 left promiscuous mode [ 600.784159][T15835] device sit0 entered promiscuous mode [ 601.888001][T15849] FAULT_INJECTION: forcing a failure. [ 601.888001][T15849] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 602.039623][T15849] CPU: 1 PID: 15849 Comm: syz.3.5366 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 602.051018][T15849] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 602.061060][T15849] Call Trace: [ 602.064334][T15849] __dump_stack+0x21/0x24 [ 602.068637][T15849] dump_stack_lvl+0x169/0x1d8 [ 602.073289][T15849] ? show_regs_print_info+0x18/0x18 [ 602.078469][T15849] ? stack_trace_save+0x98/0xe0 [ 602.083297][T15849] dump_stack+0x15/0x1c [ 602.087431][T15849] should_fail+0x3c1/0x510 [ 602.091829][T15849] should_fail_alloc_page+0x4f/0x60 [ 602.097002][T15849] __alloc_pages_nodemask+0x109/0x5f0 [ 602.102353][T15849] ? rotate_reclaimable_page+0x4a0/0x4a0 [ 602.107961][T15849] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 602.113484][T15849] ? __mod_node_page_state+0x9e/0xd0 [ 602.118748][T15849] ? lru_cache_add+0x164/0x380 [ 602.123487][T15849] ? __lru_cache_add_inactive_or_unevictable+0x38/0x160 [ 602.130403][T15849] wp_page_copy+0x1d0/0x15d0 [ 602.134969][T15849] ? stack_trace_save+0xe0/0xe0 [ 602.139803][T15849] ? trace_spf_pte_lock+0x110/0x110 [ 602.144977][T15849] ? bad_area_nosemaphore+0x2d/0x40 [ 602.150150][T15849] ? do_user_addr_fault+0xa18/0xc80 [ 602.155323][T15849] do_wp_page+0x9a6/0xc80 [ 602.159635][T15849] handle_pte_fault+0xac1/0x3750 [ 602.164554][T15849] handle_mm_fault+0xf3f/0x16a0 [ 602.169393][T15849] ? can_reuse_spf_vma+0xe0/0xe0 [ 602.174314][T15849] ? __kasan_check_write+0x14/0x20 [ 602.179402][T15849] ? down_read_trylock+0x100/0x150 [ 602.184490][T15849] ? __init_rwsem+0x1c0/0x1c0 [ 602.189144][T15849] ? find_vma+0x30/0x150 [ 602.193361][T15849] do_user_addr_fault+0x5a2/0xc80 [ 602.198362][T15849] ? do_kern_addr_fault+0x80/0x80 [ 602.203365][T15849] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 602.208802][T15849] ? _raw_spin_lock+0xe0/0xe0 [ 602.213457][T15849] exc_page_fault+0x5a/0xc0 [ 602.217935][T15849] asm_exc_page_fault+0x1e/0x30 [ 602.222762][T15849] RIP: 0010:copy_user_enhanced_fast_string+0xe/0x40 [ 602.229327][T15849] Code: 89 d1 c1 e9 03 83 e2 07 f3 48 a5 89 d1 f3 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 0f 01 cb 83 fa 40 0f 82 70 ff ff ff 89 d1 a4 31 c0 0f 01 ca c3 90 90 90 90 90 90 90 90 90 90 89 d1 83 f8 [ 602.248912][T15849] RSP: 0018:ffffc90000b07d40 EFLAGS: 00050206 [ 602.254955][T15849] RAX: ffffffff823a3c01 RBX: 000000000000b161 RCX: 00000000000058e1 [ 602.262901][T15849] RDX: 000000000000b161 RSI: ffff888111c45880 RDI: 0000200000007000 [ 602.270850][T15849] RBP: ffffc90000b07d70 R08: 0000000000000001 R09: 0000000000000000 [ 602.278803][T15849] R10: ffffed102238962c R11: 0000000000001628 R12: 00007ffffffff000 [ 602.286753][T15849] R13: 000020000000c8e1 R14: ffff888111c40000 R15: 0000200000001780 [ 602.294712][T15849] ? _copy_to_user+0x21/0x90 [ 602.299280][T15849] ? _copy_to_user+0x78/0x90 [ 602.303862][T15849] map_lookup_and_delete_elem+0x409/0x530 [ 602.309573][T15849] __se_sys_bpf+0x454/0x680 [ 602.314054][T15849] ? __x64_sys_bpf+0x90/0x90 [ 602.318620][T15849] ? fpu__clear_all+0x20/0x20 [ 602.323275][T15849] __x64_sys_bpf+0x7b/0x90 [ 602.327675][T15849] do_syscall_64+0x31/0x40 [ 602.332068][T15849] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 602.337935][T15849] RIP: 0033:0x7f882ff09929 [ 602.342331][T15849] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 602.361917][T15849] RSP: 002b:00007f882e572038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 602.370308][T15849] RAX: ffffffffffffffda RBX: 00007f8830130fa0 RCX: 00007f882ff09929 [ 602.378261][T15849] RDX: 0000000000000020 RSI: 0000200000000200 RDI: 0000000000000015 [ 602.386215][T15849] RBP: 00007f882e572090 R08: 0000000000000000 R09: 0000000000000000 [ 602.394165][T15849] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 602.402124][T15849] R13: 0000000000000000 R14: 00007f8830130fa0 R15: 00007fff0aea2778 [ 603.221056][ T95] udevd[95]: worker [5232] terminated by signal 33 (Unknown signal 33) [ 603.229369][ T95] udevd[95]: worker [5232] failed while handling '/devices/virtual/block/loop0' [ 603.322238][T15857] device sit0 left promiscuous mode [ 603.348918][T15858] device sit0 entered promiscuous mode [ 608.030754][T15881] device sit0 left promiscuous mode [ 608.166913][T15882] device sit0 entered promiscuous mode [ 612.796436][T15945] device dummy0 entered promiscuous mode [ 613.473404][T15958] device sit0 left promiscuous mode [ 613.584044][T15958] device sit0 entered promiscuous mode [ 614.748200][T15988] device sit0 left promiscuous mode [ 614.932972][T15988] device sit0 entered promiscuous mode [ 616.232711][T16007] device wg2 entered promiscuous mode [ 624.061510][T16100] device veth0_vlan left promiscuous mode [ 624.067579][T16100] device veth0_vlan entered promiscuous mode [ 624.139055][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 624.148370][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 624.164736][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 624.554979][T16115] device syzkaller0 entered promiscuous mode [ 628.509040][T16258] syz.1.5500[16258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 628.509125][T16258] syz.1.5500[16258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 628.651884][T16261] syz.1.5500[16261] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 628.684365][T16264] device sit0 left promiscuous mode [ 628.713174][T16264] device sit0 entered promiscuous mode [ 628.761957][T16261] syz.1.5500[16261] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 630.158501][T16293] device sit0 left promiscuous mode [ 630.224645][T16293] device sit0 entered promiscuous mode [ 631.958452][T16329] device pim6reg1 entered promiscuous mode [ 635.028933][T16427] device sit0 left promiscuous mode [ 635.159980][T16427] device sit0 entered promiscuous mode [ 635.234412][T16433] device sit0 left promiscuous mode [ 635.927253][T16443] syz.2.5563[16443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 635.927340][T16443] syz.2.5563[16443] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 638.634073][T16482] device pim6reg1 entered promiscuous mode [ 643.203911][T16565] device sit0 left promiscuous mode [ 643.289091][T16569] device sit0 entered promiscuous mode [ 645.032302][T16596] device syzkaller0 entered promiscuous mode [ 646.129662][T16620] bridge0: port 3(veth0) entered disabled state [ 646.136033][T16620] bridge0: port 2(bridge_slave_1) entered disabled state [ 646.143169][T16620] bridge0: port 1(bridge_slave_0) entered disabled state [ 646.463020][T16625] device veth0 left promiscuous mode [ 646.468425][T16625] bridge0: port 3(veth0) entered disabled state [ 646.557468][T16625] device bridge_slave_1 left promiscuous mode [ 646.579582][T16625] bridge0: port 2(bridge_slave_1) entered disabled state [ 646.663851][T16625] device bridge_slave_0 left promiscuous mode [ 646.689723][T16625] bridge0: port 1(bridge_slave_0) entered disabled state [ 648.717818][T16663] device pim6reg1 entered promiscuous mode [ 649.003742][T16676] device sit0 left promiscuous mode [ 652.597189][T16723] device syzkaller0 entered promiscuous mode [ 653.931987][T16760] device syzkaller0 entered promiscuous mode [ 654.548469][T16765] device wg2 entered promiscuous mode [ 654.561265][T16779] device pim6reg1 entered promiscuous mode [ 654.852785][T16800] FAULT_INJECTION: forcing a failure. [ 654.852785][T16800] name failslab, interval 1, probability 0, space 0, times 0 [ 654.889514][T16800] CPU: 0 PID: 16800 Comm: syz.2.5671 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 654.900905][T16800] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 654.910942][T16800] Call Trace: [ 654.914217][T16800] __dump_stack+0x21/0x24 [ 654.918527][T16800] dump_stack_lvl+0x169/0x1d8 [ 654.923274][T16800] ? show_regs_print_info+0x18/0x18 [ 654.928446][T16800] ? 0xffffffffa0002000 [ 654.932587][T16800] ? is_bpf_text_address+0x177/0x190 [ 654.937852][T16800] dump_stack+0x15/0x1c [ 654.941989][T16800] should_fail+0x3c1/0x510 [ 654.946382][T16800] ? __alloc_skb+0x9e/0x520 [ 654.950863][T16800] __should_failslab+0xa4/0xe0 [ 654.955604][T16800] should_failslab+0x9/0x20 [ 654.960086][T16800] kmem_cache_alloc+0x3d/0x2e0 [ 654.964824][T16800] __alloc_skb+0x9e/0x520 [ 654.969130][T16800] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 654.974391][T16800] rtnetlink_event+0xd2/0x1a0 [ 654.979049][T16800] raw_notifier_call_chain+0x90/0x100 [ 654.984402][T16800] dev_change_tx_queue_len+0x1af/0x330 [ 654.989834][T16800] ? dev_set_mtu+0xc0/0xc0 [ 654.994229][T16800] dev_ifsioc+0x607/0xa50 [ 654.998533][T16800] ? dev_ioctl+0xb80/0xb80 [ 655.002931][T16800] dev_ioctl+0x550/0xb80 [ 655.007240][T16800] sock_do_ioctl+0x235/0x330 [ 655.011805][T16800] ? __kasan_slab_free+0x11/0x20 [ 655.016718][T16800] ? sock_show_fdinfo+0xa0/0xa0 [ 655.021550][T16800] ? selinux_file_ioctl+0x377/0x480 [ 655.026726][T16800] ? mutex_trylock+0xa0/0xa0 [ 655.031296][T16800] ? __fget_files+0x2c4/0x320 [ 655.035953][T16800] sock_ioctl+0x504/0x710 [ 655.040259][T16800] ? sock_poll+0x360/0x360 [ 655.044651][T16800] ? __fget_files+0x2c4/0x320 [ 655.049309][T16800] ? security_file_ioctl+0x84/0xa0 [ 655.054398][T16800] ? sock_poll+0x360/0x360 [ 655.058793][T16800] __se_sys_ioctl+0x121/0x1a0 [ 655.063454][T16800] __x64_sys_ioctl+0x7b/0x90 [ 655.068024][T16800] do_syscall_64+0x31/0x40 [ 655.072423][T16800] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 655.078297][T16800] RIP: 0033:0x7fb3d862e929 [ 655.082692][T16800] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 655.102273][T16800] RSP: 002b:00007fb3d6c97038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 655.110666][T16800] RAX: ffffffffffffffda RBX: 00007fb3d8855fa0 RCX: 00007fb3d862e929 [ 655.118616][T16800] RDX: 0000200000002280 RSI: 0000000000008943 RDI: 0000000000000007 [ 655.126566][T16800] RBP: 00007fb3d6c97090 R08: 0000000000000000 R09: 0000000000000000 [ 655.134514][T16800] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 655.142469][T16800] R13: 0000000000000000 R14: 00007fb3d8855fa0 R15: 00007ffeaa2b77f8 [ 655.248567][T16798] device syzkaller0 entered promiscuous mode [ 655.927935][T16822] device syzkaller0 entered promiscuous mode [ 656.690574][T16846] device wg2 left promiscuous mode [ 656.890554][T16846] device wg2 entered promiscuous mode [ 659.849875][T16929] device sit0 entered promiscuous mode [ 661.318321][T16945] device sit0 entered promiscuous mode [ 661.795689][T16970] device sit0 left promiscuous mode [ 662.041544][T16971] device sit0 entered promiscuous mode [ 664.891129][T17032] device sit0 left promiscuous mode [ 664.957523][T17034] device sit0 entered promiscuous mode [ 665.100829][T17041] device sit0 left promiscuous mode [ 665.713346][T17055] device sit0 left promiscuous mode [ 665.804870][T17055] device sit0 entered promiscuous mode [ 667.095581][T17094] device pim6reg1 entered promiscuous mode [ 667.738279][T17108] device sit0 left promiscuous mode [ 667.940005][T17108] device sit0 entered promiscuous mode [ 672.161546][T17225] kfree: port 1(veth1) entered blocking state [ 672.281866][T17225] kfree: port 1(veth1) entered disabled state [ 672.394195][T17225] device veth1 entered promiscuous mode [ 673.276899][T17246] device sit0 left promiscuous mode [ 673.363553][T17252] device sit0 entered promiscuous mode [ 674.665769][T17265] bridge0: port 1(bridge_slave_0) entered blocking state [ 674.851283][T17265] bridge0: port 1(bridge_slave_0) entered disabled state [ 674.858727][T17265] device bridge_slave_0 entered promiscuous mode [ 675.119543][T17265] bridge0: port 2(bridge_slave_1) entered blocking state [ 675.198548][T17265] bridge0: port 2(bridge_slave_1) entered disabled state [ 675.322769][T17265] device bridge_slave_1 entered promiscuous mode [ 675.602569][T17265] bridge0: port 2(bridge_slave_1) entered blocking state [ 675.609671][T17265] bridge0: port 2(bridge_slave_1) entered forwarding state [ 675.616963][T17265] bridge0: port 1(bridge_slave_0) entered blocking state [ 675.624149][T17265] bridge0: port 1(bridge_slave_0) entered forwarding state [ 675.770650][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 675.785344][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 676.472614][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 676.569784][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 676.614905][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 676.625121][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 676.633594][ T296] bridge0: port 1(bridge_slave_0) entered blocking state [ 676.640655][ T296] bridge0: port 1(bridge_slave_0) entered forwarding state [ 676.648378][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 676.656830][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 676.699915][ T296] bridge0: port 2(bridge_slave_1) entered blocking state [ 676.707006][ T296] bridge0: port 2(bridge_slave_1) entered forwarding state [ 676.808356][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 676.922612][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 677.038545][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 677.214800][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 677.336054][T17313] device sit0 left promiscuous mode [ 677.374019][T17314] device sit0 entered promiscuous mode [ 678.253942][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 678.269802][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 678.329822][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 678.359272][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 678.390531][T17265] device veth0_vlan entered promiscuous mode [ 678.530490][T17265] device veth1_macvtap entered promiscuous mode [ 678.615698][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 678.643581][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 678.722301][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 678.730735][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 678.739017][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 678.883968][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 678.980278][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 679.139893][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 679.332098][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 682.878401][T17372] device wg2 left promiscuous mode [ 683.212093][T17375] device wg2 entered promiscuous mode [ 686.109885][T17430] device wg2 left promiscuous mode [ 686.898215][T17434] device syzkaller0 entered promiscuous mode [ 690.036185][T17503] bridge0: port 1(bridge_slave_0) entered blocking state [ 690.056071][T17503] bridge0: port 1(bridge_slave_0) entered disabled state [ 690.079953][T17503] device bridge_slave_0 entered promiscuous mode [ 690.095822][T17503] bridge0: port 2(bridge_slave_1) entered blocking state [ 690.144825][T17503] bridge0: port 2(bridge_slave_1) entered disabled state [ 690.172995][T17503] device bridge_slave_1 entered promiscuous mode [ 690.851135][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 690.863167][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 690.920748][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 690.964893][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 691.063588][ T3942] bridge0: port 1(bridge_slave_0) entered blocking state [ 691.070690][ T3942] bridge0: port 1(bridge_slave_0) entered forwarding state [ 691.228351][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 691.280197][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 691.288444][ T3942] bridge0: port 2(bridge_slave_1) entered blocking state [ 691.295528][ T3942] bridge0: port 2(bridge_slave_1) entered forwarding state [ 691.325845][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 691.349991][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 691.382779][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 691.400658][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 691.424627][T17503] device veth0_vlan entered promiscuous mode [ 691.439828][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 691.448309][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 691.456892][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 691.470000][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 691.527865][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 691.546382][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 691.562265][T17503] device veth1_macvtap entered promiscuous mode [ 691.679285][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 691.716247][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 691.778272][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 691.857146][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 691.938792][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 692.559499][ T9] device bridge_slave_1 left promiscuous mode [ 692.565708][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 692.616084][ T9] device bridge_slave_0 left promiscuous mode [ 692.679932][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 693.008649][T17582] device sit0 entered promiscuous mode [ 700.056896][T17744] device sit0 left promiscuous mode [ 700.124609][T17747] device sit0 entered promiscuous mode [ 701.092074][T17766] FAULT_INJECTION: forcing a failure. [ 701.092074][T17766] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 701.134858][T17766] CPU: 0 PID: 17766 Comm: syz.1.5967 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 701.146254][T17766] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 701.156314][T17766] Call Trace: [ 701.159606][T17766] __dump_stack+0x21/0x24 [ 701.163932][T17766] dump_stack_lvl+0x169/0x1d8 [ 701.168606][T17766] ? show_regs_print_info+0x18/0x18 [ 701.173806][T17766] dump_stack+0x15/0x1c [ 701.177956][T17766] should_fail+0x3c1/0x510 [ 701.182368][T17766] should_fail_usercopy+0x1a/0x20 [ 701.187381][T17766] _copy_from_user+0x20/0xd0 [ 701.191960][T17766] __se_sys_bpf+0x181/0x680 [ 701.196452][T17766] ? __x64_sys_bpf+0x90/0x90 [ 701.201035][T17766] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 701.207183][T17766] __x64_sys_bpf+0x7b/0x90 [ 701.211591][T17766] do_syscall_64+0x31/0x40 [ 701.216001][T17766] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 701.221880][T17766] RIP: 0033:0x7f56bea8e929 [ 701.226288][T17766] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 701.245883][T17766] RSP: 002b:00007f56bd0f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 701.254290][T17766] RAX: ffffffffffffffda RBX: 00007f56becb5fa0 RCX: 00007f56bea8e929 [ 701.262260][T17766] RDX: 0000000000000020 RSI: 0000200000000300 RDI: 0000000000000001 [ 701.270226][T17766] RBP: 00007f56bd0f7090 R08: 0000000000000000 R09: 0000000000000000 [ 701.278188][T17766] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 701.286150][T17766] R13: 0000000000000000 R14: 00007f56becb5fa0 R15: 00007ffe3fa80c38 [ 702.209915][T17797] device wg2 left promiscuous mode [ 702.460736][T17796] device wg2 entered promiscuous mode [ 703.460671][T17818] bridge0: port 2(bridge_slave_1) entered disabled state [ 703.476206][T17818] bridge0: port 1(bridge_slave_0) entered disabled state [ 703.782461][T17819] device bridge_slave_1 left promiscuous mode [ 703.797551][T17819] bridge0: port 2(bridge_slave_1) entered disabled state [ 703.817583][T17819] device bridge_slave_0 left promiscuous mode [ 703.834682][T17819] bridge0: port 1(bridge_slave_0) entered disabled state [ 707.148187][T17887] device sit0 left promiscuous mode [ 707.356838][T17887] device sit0 entered promiscuous mode [ 709.358656][T17923] device sit0 entered promiscuous mode [ 711.342090][ T24] audit: type=1400 audit(1749586700.399:156): avc: denied { create } for pid=17965 comm="syz.1.6028" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 713.302564][T18011] device sit0 left promiscuous mode [ 715.595152][T18048] device pim6reg1 entered promiscuous mode [ 717.166116][T18068] syz.4.6057[18068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 717.166182][T18068] syz.4.6057[18068] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 717.366873][T18071] device sit0 left promiscuous mode [ 717.571595][T18073] -1: renamed from syzkaller0 [ 717.789050][T18072] device sit0 entered promiscuous mode [ 718.423667][ T24] audit: type=1400 audit(1749586707.479:157): avc: denied { read } for pid=18081 comm="syz.0.6062" dev="nsfs" ino=4026533161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 718.528969][ T24] audit: type=1400 audit(1749586707.479:158): avc: denied { open } for pid=18081 comm="syz.0.6062" path="mnt:[4026533161]" dev="nsfs" ino=4026533161 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 719.284637][T18089] device sit0 entered promiscuous mode [ 720.531181][T18101] device veth0_vlan left promiscuous mode [ 720.537296][T18101] device veth0_vlan entered promiscuous mode [ 720.545661][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 720.556699][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 720.585221][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 720.760292][T18106] bridge0: port 1(bridge_slave_0) entered blocking state [ 720.767352][T18106] bridge0: port 1(bridge_slave_0) entered disabled state [ 720.835839][T18106] device bridge_slave_0 entered promiscuous mode [ 720.843416][T18106] bridge0: port 2(bridge_slave_1) entered blocking state [ 720.850758][T18106] bridge0: port 2(bridge_slave_1) entered disabled state [ 720.858182][T18106] device bridge_slave_1 entered promiscuous mode [ 721.226393][T18106] bridge0: port 2(bridge_slave_1) entered blocking state [ 721.233512][T18106] bridge0: port 2(bridge_slave_1) entered forwarding state [ 721.240807][T18106] bridge0: port 1(bridge_slave_0) entered blocking state [ 721.247823][T18106] bridge0: port 1(bridge_slave_0) entered forwarding state [ 721.714930][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 721.723916][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 721.732802][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 721.840580][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 721.912526][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 722.037137][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 722.064054][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 722.073398][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 722.113040][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 722.159805][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 722.167694][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 722.249910][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 722.369802][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 722.424734][T18106] device veth0_vlan entered promiscuous mode [ 722.512825][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 722.539827][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 722.621066][T18106] device veth1_macvtap entered promiscuous mode [ 722.670583][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 722.686646][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 722.706365][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 722.742924][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 722.818862][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 722.910385][ T3942] device veth1_macvtap left promiscuous mode [ 723.274929][T18140] device sit0 left promiscuous mode [ 723.303235][T18143] device sit0 entered promiscuous mode [ 724.606605][T18158] bridge0: port 1(bridge_slave_0) entered blocking state [ 724.662949][T18158] bridge0: port 1(bridge_slave_0) entered disabled state [ 724.745454][T18158] device bridge_slave_0 entered promiscuous mode [ 724.790698][T18158] bridge0: port 2(bridge_slave_1) entered blocking state [ 724.797770][T18158] bridge0: port 2(bridge_slave_1) entered disabled state [ 724.805429][T18158] device bridge_slave_1 entered promiscuous mode [ 724.853391][T18158] bridge0: port 2(bridge_slave_1) entered blocking state [ 724.860482][T18158] bridge0: port 2(bridge_slave_1) entered forwarding state [ 724.867752][T18158] bridge0: port 1(bridge_slave_0) entered blocking state [ 724.874823][T18158] bridge0: port 1(bridge_slave_0) entered forwarding state [ 725.003330][T18179] device sit0 entered promiscuous mode [ 725.936185][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 725.953330][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 726.000460][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 726.128424][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 726.162189][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 726.248482][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 726.298062][ T296] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 726.368500][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 726.378349][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 726.415924][T18158] device veth0_vlan entered promiscuous mode [ 726.466313][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 726.505361][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 726.592441][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 726.621839][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 726.685394][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 726.731218][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 726.804742][T18158] device veth1_macvtap entered promiscuous mode [ 726.868262][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 726.900289][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 726.973472][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 727.034455][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 727.089239][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 727.317436][ T3942] device erspan0 left promiscuous mode [ 727.323283][ T3942] GPL: port 1(erspan0) entered disabled state [ 728.395821][T18249] device sit0 left promiscuous mode [ 728.412905][T18251] device sit0 entered promiscuous mode [ 729.289601][ T3942] device bridge_slave_1 left promiscuous mode [ 729.309044][ T3942] bridge0: port 2(bridge_slave_1) entered disabled state [ 729.328431][ T3942] device bridge_slave_0 left promiscuous mode [ 729.355040][ T3942] bridge0: port 1(bridge_slave_0) entered disabled state [ 729.378697][ T3942] device veth0_vlan left promiscuous mode [ 729.514992][ T24] audit: type=1400 audit(1749586718.569:159): avc: denied { ioctl } for pid=18258 comm="syz.0.6114" path="uts:[4026533163]" dev="nsfs" ino=4026533163 ioctlcmd=0xb701 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 729.786074][T18268] device wg2 entered promiscuous mode [ 735.575679][T18343] bridge0: port 1(bridge_slave_0) entered blocking state [ 735.599442][T18343] bridge0: port 1(bridge_slave_0) entered disabled state [ 735.635848][T18343] device bridge_slave_0 entered promiscuous mode [ 735.739660][T18343] bridge0: port 2(bridge_slave_1) entered blocking state [ 735.778893][T18343] bridge0: port 2(bridge_slave_1) entered disabled state [ 735.789740][T18343] device bridge_slave_1 entered promiscuous mode [ 735.809890][T18454] bridge0: port 2(bridge_slave_1) entered disabled state [ 735.823246][T18454] bridge0: port 1(bridge_slave_0) entered disabled state [ 736.820939][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 736.828563][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 736.840241][T18471] bridge0: port 2(bridge_slave_1) entered disabled state [ 736.847721][T18471] bridge0: port 1(bridge_slave_0) entered disabled state [ 736.860193][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 736.869353][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 736.892619][T17324] bridge0: port 1(bridge_slave_0) entered blocking state [ 736.899715][T17324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 736.912969][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 736.983769][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 737.072408][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 737.159456][T17324] bridge0: port 2(bridge_slave_1) entered blocking state [ 737.166518][T17324] bridge0: port 2(bridge_slave_1) entered forwarding state [ 737.224245][T18472] device bridge_slave_1 left promiscuous mode [ 737.237019][T18472] bridge0: port 2(bridge_slave_1) entered disabled state [ 737.244629][T18472] device bridge_slave_0 left promiscuous mode [ 737.250831][T18472] bridge0: port 1(bridge_slave_0) entered disabled state [ 737.282952][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 737.299109][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 737.336416][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 737.428283][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 737.571077][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 737.594704][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 737.703679][T18343] device veth0_vlan entered promiscuous mode [ 737.976318][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 738.011242][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 738.183292][T18343] device veth1_macvtap entered promiscuous mode [ 738.297407][ T3942] device veth1 left promiscuous mode [ 738.302919][ T3942] kfree: port 1(veth1) entered disabled state [ 738.353245][ T3942] device bridge_slave_1 left promiscuous mode [ 738.361874][ T3942] bridge0: port 2(bridge_slave_1) entered disabled state [ 738.379912][ T3942] device bridge_slave_0 left promiscuous mode [ 738.386042][ T3942] bridge0: port 1(bridge_slave_0) entered disabled state [ 738.410406][ T3942] device veth1_macvtap left promiscuous mode [ 738.623600][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 738.653138][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 738.673112][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 738.847765][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 738.856673][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 740.643766][T18544] device sit0 left promiscuous mode [ 740.928085][T18544] device sit0 entered promiscuous mode [ 742.964276][T18594] FAULT_INJECTION: forcing a failure. [ 742.964276][T18594] name failslab, interval 1, probability 0, space 0, times 0 [ 743.009866][T18594] CPU: 0 PID: 18594 Comm: syz.1.6184 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 743.021264][T18594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 743.031311][T18594] Call Trace: [ 743.034600][T18594] __dump_stack+0x21/0x24 [ 743.038919][T18594] dump_stack_lvl+0x169/0x1d8 [ 743.043605][T18594] ? show_regs_print_info+0x18/0x18 [ 743.048826][T18594] dump_stack+0x15/0x1c [ 743.052988][T18594] should_fail+0x3c1/0x510 [ 743.057406][T18594] ? alloc_vmap_area+0x626/0x1870 [ 743.062430][T18594] __should_failslab+0xa4/0xe0 [ 743.067196][T18594] should_failslab+0x9/0x20 [ 743.071694][T18594] kmem_cache_alloc+0x3d/0x2e0 [ 743.076449][T18594] ? alloc_vmap_area+0x16b/0x1870 [ 743.081468][T18594] alloc_vmap_area+0x626/0x1870 [ 743.086312][T18594] ? vm_map_ram+0x9c0/0x9c0 [ 743.090810][T18594] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 743.096350][T18594] ? __get_vm_area_node+0x113/0x450 [ 743.101547][T18594] __get_vm_area_node+0x147/0x450 [ 743.106572][T18594] __vmalloc_node_range+0xe0/0x780 [ 743.111673][T18594] ? reuseport_array_alloc+0x16e/0x260 [ 743.117121][T18594] bpf_map_area_alloc+0xd5/0xe0 [ 743.121966][T18594] ? reuseport_array_alloc+0x16e/0x260 [ 743.127421][T18594] reuseport_array_alloc+0x16e/0x260 [ 743.132699][T18594] ? array_map_alloc_check+0x265/0x390 [ 743.138153][T18594] ? reuseport_array_alloc_check+0x90/0x90 [ 743.143949][T18594] ? array_map_alloc_check+0x27f/0x390 [ 743.149404][T18594] ? array_map_alloc_check+0x284/0x390 [ 743.154859][T18594] map_create+0x441/0x2190 [ 743.159273][T18594] __se_sys_bpf+0x203/0x680 [ 743.163771][T18594] ? __x64_sys_bpf+0x90/0x90 [ 743.168361][T18594] ? __kasan_check_read+0x11/0x20 [ 743.173393][T18594] ? __kasan_check_read+0x11/0x20 [ 743.178425][T18594] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 743.184497][T18594] __x64_sys_bpf+0x7b/0x90 [ 743.188920][T18594] do_syscall_64+0x31/0x40 [ 743.193341][T18594] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 743.199232][T18594] RIP: 0033:0x7f69f458b929 [ 743.203653][T18594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 743.223264][T18594] RSP: 002b:00007f69f2bf4038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 743.231683][T18594] RAX: ffffffffffffffda RBX: 00007f69f47b2fa0 RCX: 00007f69f458b929 [ 743.239654][T18594] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 743.247626][T18594] RBP: 00007f69f2bf4090 R08: 0000000000000000 R09: 0000000000000000 [ 743.255599][T18594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 743.263575][T18594] R13: 0000000000000000 R14: 00007f69f47b2fa0 R15: 00007ffdca552d58 [ 743.272071][T18597] device sit0 left promiscuous mode [ 743.286492][T18598] device sit0 entered promiscuous mode [ 745.619842][T18657] device bridge_slave_1 left promiscuous mode [ 745.660035][T18655] FAULT_INJECTION: forcing a failure. [ 745.660035][T18655] name failslab, interval 1, probability 0, space 0, times 0 [ 745.673025][T18655] CPU: 0 PID: 18655 Comm: syz.0.6206 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 745.684386][T18655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 745.694437][T18655] Call Trace: [ 745.697724][T18655] __dump_stack+0x21/0x24 [ 745.702042][T18655] dump_stack_lvl+0x169/0x1d8 [ 745.706712][T18655] ? thaw_kernel_threads+0x220/0x220 [ 745.711988][T18655] ? show_regs_print_info+0x18/0x18 [ 745.717174][T18655] ? avc_has_perm_noaudit+0x158/0x240 [ 745.722656][T18655] dump_stack+0x15/0x1c [ 745.726803][T18655] should_fail+0x3c1/0x510 [ 745.731212][T18655] ? __get_vm_area_node+0x113/0x450 [ 745.736404][T18655] __should_failslab+0xa4/0xe0 [ 745.741191][T18655] should_failslab+0x9/0x20 [ 745.745838][T18655] kmem_cache_alloc_trace+0x3a/0x2e0 [ 745.751137][T18655] ? selinux_capable+0x29c/0x380 [ 745.756073][T18655] __get_vm_area_node+0x113/0x450 [ 745.761115][T18655] __vmalloc_node_range+0xe0/0x780 [ 745.766220][T18655] ? reuseport_array_alloc+0x16e/0x260 [ 745.771666][T18655] ? cap_capable+0x19c/0x220 [ 745.776246][T18655] bpf_map_area_alloc+0xd5/0xe0 [ 745.781091][T18655] ? reuseport_array_alloc+0x16e/0x260 [ 745.786631][T18655] reuseport_array_alloc+0x16e/0x260 [ 745.791909][T18655] ? map_create+0x57/0x2190 [ 745.796487][T18655] ? reuseport_array_alloc_check+0x90/0x90 [ 745.802284][T18655] ? array_map_alloc_check+0x284/0x390 [ 745.807734][T18655] map_create+0x441/0x2190 [ 745.812161][T18655] __se_sys_bpf+0x203/0x680 [ 745.816653][T18655] ? __x64_sys_bpf+0x90/0x90 [ 745.821234][T18655] ? __x64_sys_openat+0x120/0x160 [ 745.826244][T18655] __x64_sys_bpf+0x7b/0x90 [ 745.830654][T18655] do_syscall_64+0x31/0x40 [ 745.835068][T18655] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 745.840948][T18655] RIP: 0033:0x7f0226531929 [ 745.845386][T18655] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 745.864994][T18655] RSP: 002b:00007f0224b9a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 745.873412][T18655] RAX: ffffffffffffffda RBX: 00007f0226758fa0 RCX: 00007f0226531929 [ 745.881378][T18655] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 745.889355][T18655] RBP: 00007f0224b9a090 R08: 0000000000000000 R09: 0000000000000000 [ 745.897534][T18655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 745.905504][T18655] R13: 0000000000000000 R14: 00007f0226758fa0 R15: 00007ffd3f70f418 [ 745.919798][T18657] bridge0: port 2(bridge_slave_1) entered disabled state [ 745.929267][T18657] device bridge_slave_0 left promiscuous mode [ 745.938749][T18657] bridge0: port 1(bridge_slave_0) entered disabled state [ 745.972343][T18653] ref_ctr_offset mismatch. inode: 0x180 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 746.199629][T18673] device sit0 entered promiscuous mode [ 748.630619][ T24] audit: type=1400 audit(1749586737.669:160): avc: denied { create } for pid=18727 comm="syz.1.6230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 750.284855][T18754] device sit0 left promiscuous mode [ 750.394769][T18756] device sit0 entered promiscuous mode [ 751.329912][T18778] device sit0 left promiscuous mode [ 751.436757][T18780] bridge0: port 2(bridge_slave_1) entered disabled state [ 751.452755][T18780] bridge0: port 1(bridge_slave_0) entered disabled state [ 751.727586][T18783] device sit0 entered promiscuous mode [ 752.239994][T18785] device bridge_slave_1 left promiscuous mode [ 752.246194][T18785] bridge0: port 2(bridge_slave_1) entered disabled state [ 752.257944][T18785] device bridge_slave_0 left promiscuous mode [ 752.266398][T18785] bridge0: port 1(bridge_slave_0) entered disabled state [ 752.590394][T18798] device pim6reg1 entered promiscuous mode [ 752.600649][T18791] device veth0_vlan left promiscuous mode [ 752.607147][T18791] device veth0_vlan entered promiscuous mode [ 753.683071][T18836] device sit0 left promiscuous mode [ 754.009772][T18845] syz.4.6268[18845] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 754.009858][T18845] syz.4.6268[18845] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 754.420039][T18842] device veth0_vlan left promiscuous mode [ 754.511524][T18842] device veth0_vlan entered promiscuous mode [ 754.563033][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 754.589265][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 754.675506][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 755.223098][T18865] bridge0: port 2(bridge_slave_1) entered disabled state [ 755.230773][T18865] bridge0: port 1(bridge_slave_0) entered disabled state [ 755.426826][T18867] device bridge_slave_1 left promiscuous mode [ 755.530046][T18867] bridge0: port 2(bridge_slave_1) entered disabled state [ 755.591307][T18867] device bridge_slave_0 left promiscuous mode [ 755.629958][T18867] bridge0: port 1(bridge_slave_0) entered disabled state [ 757.251030][T18929] syz.1.6295[18929] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 757.251083][T18929] syz.1.6295[18929] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 759.198690][T18992] device sit0 entered promiscuous mode [ 763.042574][T19079] FAULT_INJECTION: forcing a failure. [ 763.042574][T19079] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 763.179835][T19079] CPU: 1 PID: 19079 Comm: syz.0.6348 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 763.191237][T19079] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 763.201293][T19079] Call Trace: [ 763.204579][T19079] __dump_stack+0x21/0x24 [ 763.208897][T19079] dump_stack_lvl+0x169/0x1d8 [ 763.213572][T19079] ? show_regs_print_info+0x18/0x18 [ 763.218759][T19079] dump_stack+0x15/0x1c [ 763.222906][T19079] should_fail+0x3c1/0x510 [ 763.227311][T19079] should_fail_alloc_page+0x4f/0x60 [ 763.232497][T19079] __alloc_pages_nodemask+0x109/0x5f0 [ 763.237859][T19079] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 763.243920][T19079] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 763.249457][T19079] ? _raw_spin_trylock_bh+0x130/0x130 [ 763.254821][T19079] __get_free_pages+0xe/0x30 [ 763.259401][T19079] kasan_populate_vmalloc_pte+0x29/0x120 [ 763.265020][T19079] __apply_to_page_range+0x74e/0x9e0 [ 763.270295][T19079] ? kasan_populate_vmalloc+0x70/0x70 [ 763.275669][T19079] ? kasan_populate_vmalloc+0x70/0x70 [ 763.281029][T19079] apply_to_page_range+0x3b/0x50 [ 763.285959][T19079] kasan_populate_vmalloc+0x60/0x70 [ 763.291150][T19079] alloc_vmap_area+0x1734/0x1870 [ 763.296088][T19079] ? vm_map_ram+0x9c0/0x9c0 [ 763.300585][T19079] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 763.306119][T19079] ? selinux_capable+0x29c/0x380 [ 763.311046][T19079] ? __get_vm_area_node+0x113/0x450 [ 763.316234][T19079] __get_vm_area_node+0x147/0x450 [ 763.321270][T19079] __vmalloc_node_range+0xe0/0x780 [ 763.326378][T19079] ? reuseport_array_alloc+0x16e/0x260 [ 763.331835][T19079] ? cap_capable+0x19c/0x220 [ 763.336435][T19079] bpf_map_area_alloc+0xd5/0xe0 [ 763.341284][T19079] ? reuseport_array_alloc+0x16e/0x260 [ 763.346730][T19079] reuseport_array_alloc+0x16e/0x260 [ 763.351999][T19079] ? reuseport_array_alloc_check+0x90/0x90 [ 763.357792][T19079] ? array_map_alloc_check+0x284/0x390 [ 763.363239][T19079] map_create+0x441/0x2190 [ 763.367665][T19079] __se_sys_bpf+0x203/0x680 [ 763.372163][T19079] ? __x64_sys_bpf+0x90/0x90 [ 763.376746][T19079] ? fpu__clear_all+0x20/0x20 [ 763.381416][T19079] __x64_sys_bpf+0x7b/0x90 [ 763.385820][T19079] do_syscall_64+0x31/0x40 [ 763.390236][T19079] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 763.396128][T19079] RIP: 0033:0x7f0226531929 [ 763.400536][T19079] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 763.420133][T19079] RSP: 002b:00007f0224b9a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 763.428542][T19079] RAX: ffffffffffffffda RBX: 00007f0226758fa0 RCX: 00007f0226531929 [ 763.436506][T19079] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 0000000000000000 [ 763.444477][T19079] RBP: 00007f0224b9a090 R08: 0000000000000000 R09: 0000000000000000 [ 763.452453][T19079] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 763.460421][T19079] R13: 0000000000000000 R14: 00007f0226758fa0 R15: 00007ffd3f70f418 [ 763.546036][T19097] device sit0 left promiscuous mode [ 763.625285][T19097] device sit0 entered promiscuous mode [ 763.934629][T19111] device sit0 left promiscuous mode [ 763.961335][T19111] device sit0 entered promiscuous mode [ 765.010873][T19133] device sit0 left promiscuous mode [ 767.525104][T19197] device sit0 left promiscuous mode [ 767.547214][T19197] device sit0 entered promiscuous mode [ 770.845982][T19304] device sit0 left promiscuous mode [ 770.896791][ T24] audit: type=1400 audit(1749586759.949:161): avc: denied { create } for pid=19310 comm="syz.1.6423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 771.032224][T19304] device sit0 entered promiscuous mode [ 771.751817][T19320] device sit0 entered promiscuous mode [ 775.168425][T19395] device sit0 left promiscuous mode [ 775.308699][T19401] device sit0 entered promiscuous mode [ 776.034532][T19414] device sit0 left promiscuous mode [ 776.048023][T19415] device sit0 entered promiscuous mode [ 780.573420][T19543] syz.0.6491[19543] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 780.583894][T19543] syz.0.6491[19543] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 781.444650][T19573] device sit0 left promiscuous mode [ 781.633807][T19576] device sit0 entered promiscuous mode [ 782.433515][T19597] device veth1_macvtap left promiscuous mode [ 782.646650][T19597] device veth1_macvtap entered promiscuous mode [ 782.674986][T19597] device macsec0 entered promiscuous mode [ 783.801995][T19675] device sit0 entered promiscuous mode [ 786.192101][T19741] FAULT_INJECTION: forcing a failure. [ 786.192101][T19741] name failslab, interval 1, probability 0, space 0, times 0 [ 786.211779][T19741] CPU: 1 PID: 19741 Comm: syz.2.6564 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 786.223159][T19741] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 786.233207][T19741] Call Trace: [ 786.236498][T19741] __dump_stack+0x21/0x24 [ 786.240824][T19741] dump_stack_lvl+0x169/0x1d8 [ 786.245499][T19741] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 786.251647][T19741] ? show_regs_print_info+0x18/0x18 [ 786.256834][T19741] dump_stack+0x15/0x1c [ 786.260998][T19741] should_fail+0x3c1/0x510 [ 786.265882][T19741] ? call_usermodehelper_setup+0x71/0x1d0 [ 786.271591][T19741] __should_failslab+0xa4/0xe0 [ 786.276341][T19741] should_failslab+0x9/0x20 [ 786.280834][T19741] kmem_cache_alloc_trace+0x3a/0x2e0 [ 786.286108][T19741] call_usermodehelper_setup+0x71/0x1d0 [ 786.291644][T19741] ? __request_module+0x890/0x890 [ 786.296655][T19741] __request_module+0x35d/0x890 [ 786.301491][T19741] ? selinux_capable+0x29c/0x380 [ 786.306417][T19741] ? copy_regset_to_user+0x200/0x200 [ 786.311692][T19741] ? cap_capable+0x19c/0x220 [ 786.316270][T19741] ? security_capable+0x87/0xb0 [ 786.321111][T19741] dev_load+0x5b/0xb0 [ 786.325078][T19741] dev_ioctl+0x5d7/0xb80 [ 786.329309][T19741] sock_ioctl+0x6a0/0x710 [ 786.333624][T19741] ? sock_poll+0x360/0x360 [ 786.338028][T19741] ? __fget_files+0x2c4/0x320 [ 786.342694][T19741] ? security_file_ioctl+0x84/0xa0 [ 786.347794][T19741] ? sock_poll+0x360/0x360 [ 786.352197][T19741] __se_sys_ioctl+0x121/0x1a0 [ 786.356859][T19741] __x64_sys_ioctl+0x7b/0x90 [ 786.361440][T19741] do_syscall_64+0x31/0x40 [ 786.366318][T19741] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 786.372194][T19741] RIP: 0033:0x7f006a5c6929 [ 786.376608][T19741] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 786.396211][T19741] RSP: 002b:00007f0068c2f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 786.404616][T19741] RAX: ffffffffffffffda RBX: 00007f006a7edfa0 RCX: 00007f006a5c6929 [ 786.412578][T19741] RDX: 0000200000000080 RSI: 00000000000089f0 RDI: 000000000000000b [ 786.420545][T19741] RBP: 00007f0068c2f090 R08: 0000000000000000 R09: 0000000000000000 [ 786.428512][T19741] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 786.436475][T19741] R13: 0000000000000000 R14: 00007f006a7edfa0 R15: 00007ffedd9ff028 [ 786.645852][ T24] audit: type=1400 audit(1749586775.699:162): avc: denied { sys_module } for pid=19740 comm="syz.2.6564" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 792.067702][T19878] device syzkaller0 entered promiscuous mode [ 792.739269][T19922] device sit0 left promiscuous mode [ 792.888565][T19929] device sit0 entered promiscuous mode [ 793.921084][T19986] FAULT_INJECTION: forcing a failure. [ 793.921084][T19986] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 793.949292][T19986] CPU: 1 PID: 19986 Comm: syz.0.6652 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 793.960692][T19986] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 793.970743][T19986] Call Trace: [ 793.974812][T19986] __dump_stack+0x21/0x24 [ 793.979143][T19986] dump_stack_lvl+0x169/0x1d8 [ 793.983812][T19986] ? show_regs_print_info+0x18/0x18 [ 793.988996][T19986] ? vfs_write+0xac8/0xd60 [ 793.993403][T19986] dump_stack+0x15/0x1c [ 793.997550][T19986] should_fail+0x3c1/0x510 [ 794.001956][T19986] should_fail_usercopy+0x1a/0x20 [ 794.006966][T19986] _copy_from_user+0x20/0xd0 [ 794.011550][T19986] __se_sys_bpf+0x181/0x680 [ 794.016043][T19986] ? __x64_sys_bpf+0x90/0x90 [ 794.020628][T19986] ? fpu__clear_all+0x20/0x20 [ 794.025297][T19986] __x64_sys_bpf+0x7b/0x90 [ 794.029703][T19986] do_syscall_64+0x31/0x40 [ 794.034111][T19986] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 794.039990][T19986] RIP: 0033:0x7f0226531929 [ 794.044395][T19986] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 794.064078][T19986] RSP: 002b:00007f0224b9a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 794.072485][T19986] RAX: ffffffffffffffda RBX: 00007f0226758fa0 RCX: 00007f0226531929 [ 794.080452][T19986] RDX: 0000000000000048 RSI: 0000200000000040 RDI: 0000000000000000 [ 794.088416][T19986] RBP: 00007f0224b9a090 R08: 0000000000000000 R09: 0000000000000000 [ 794.096390][T19986] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 794.104355][T19986] R13: 0000000000000000 R14: 00007f0226758fa0 R15: 00007ffd3f70f418 [ 795.352403][T20003] device veth0_vlan left promiscuous mode [ 795.643305][T20003] device veth0_vlan entered promiscuous mode [ 795.791116][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 795.871578][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 795.963627][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 801.272747][T20158] device pim6reg1 entered promiscuous mode [ 801.656803][T20167] device veth0_vlan left promiscuous mode [ 801.678111][T20167] device veth0_vlan entered promiscuous mode [ 802.818961][T20206] device veth0_vlan left promiscuous mode [ 802.825385][T20206] device veth0_vlan entered promiscuous mode [ 802.833469][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 802.872440][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 802.926326][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 804.440389][T20244] device wg2 left promiscuous mode [ 804.497298][T20244] device wg2 entered promiscuous mode [ 810.763216][T20368] device pim6reg1 entered promiscuous mode [ 813.602073][T20420] tap0: tun_chr_ioctl cmd 1074025677 [ 813.608657][T20420] tap0: linktype set to 773 [ 818.595309][T20547] device sit0 left promiscuous mode [ 818.832799][T20547] device sit0 entered promiscuous mode [ 821.566212][T20607] device wg2 entered promiscuous mode [ 825.953608][T20695] device sit0 left promiscuous mode [ 826.941091][T20701] device sit0 entered promiscuous mode [ 827.108732][T20700] device wg2 entered promiscuous mode [ 827.932149][T20731] bond_slave_1: mtu less than device minimum [ 830.413331][T20783] FAULT_INJECTION: forcing a failure. [ 830.413331][T20783] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 830.577554][T20783] CPU: 0 PID: 20783 Comm: syz.2.6913 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 830.588961][T20783] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 830.599009][T20783] Call Trace: [ 830.602294][T20783] __dump_stack+0x21/0x24 [ 830.606613][T20783] dump_stack_lvl+0x169/0x1d8 [ 830.611285][T20783] ? show_regs_print_info+0x18/0x18 [ 830.616479][T20783] dump_stack+0x15/0x1c [ 830.620631][T20783] should_fail+0x3c1/0x510 [ 830.625037][T20783] should_fail_alloc_page+0x4f/0x60 [ 830.630225][T20783] __alloc_pages_nodemask+0x109/0x5f0 [ 830.635591][T20783] ? do_syscall_64+0x31/0x40 [ 830.640186][T20783] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 830.646259][T20783] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 830.651798][T20783] ? _raw_spin_trylock_bh+0x130/0x130 [ 830.657158][T20783] __get_free_pages+0xe/0x30 [ 830.661739][T20783] kasan_populate_vmalloc_pte+0x29/0x120 [ 830.667360][T20783] __apply_to_page_range+0x74e/0x9e0 [ 830.672637][T20783] ? kasan_populate_vmalloc+0x70/0x70 [ 830.678000][T20783] ? kasan_populate_vmalloc+0x70/0x70 [ 830.683360][T20783] apply_to_page_range+0x3b/0x50 [ 830.688286][T20783] kasan_populate_vmalloc+0x60/0x70 [ 830.693471][T20783] alloc_vmap_area+0x1734/0x1870 [ 830.698402][T20783] ? vm_map_ram+0x9c0/0x9c0 [ 830.702892][T20783] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 830.708442][T20783] ? selinux_capable+0x29c/0x380 [ 830.713372][T20783] ? __get_vm_area_node+0x113/0x450 [ 830.718560][T20783] __get_vm_area_node+0x147/0x450 [ 830.723572][T20783] __vmalloc_node_range+0xe0/0x780 [ 830.728682][T20783] ? array_map_alloc+0x330/0x7c0 [ 830.733606][T20783] ? cap_capable+0x19c/0x220 [ 830.738186][T20783] bpf_map_area_alloc+0xd5/0xe0 [ 830.743020][T20783] ? array_map_alloc+0x330/0x7c0 [ 830.747945][T20783] array_map_alloc+0x330/0x7c0 [ 830.752698][T20783] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 830.758318][T20783] ? fput+0x1a/0x20 [ 830.762115][T20783] ? bpf_map_meta_alloc+0x16d/0x760 [ 830.767301][T20783] array_of_map_alloc+0x55/0xc0 [ 830.772138][T20783] map_create+0x441/0x2190 [ 830.776542][T20783] __se_sys_bpf+0x203/0x680 [ 830.781032][T20783] ? __x64_sys_bpf+0x90/0x90 [ 830.785613][T20783] ? fpu__clear_all+0x20/0x20 [ 830.790279][T20783] __x64_sys_bpf+0x7b/0x90 [ 830.794685][T20783] do_syscall_64+0x31/0x40 [ 830.799093][T20783] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 830.804969][T20783] RIP: 0033:0x7f006a5c6929 [ 830.809374][T20783] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 830.828977][T20783] RSP: 002b:00007f0068c2f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 830.837386][T20783] RAX: ffffffffffffffda RBX: 00007f006a7edfa0 RCX: 00007f006a5c6929 [ 830.845350][T20783] RDX: 0000000000000048 RSI: 0000200000000040 RDI: 0000000000000000 [ 830.853398][T20783] RBP: 00007f0068c2f090 R08: 0000000000000000 R09: 0000000000000000 [ 830.861356][T20783] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 830.869319][T20783] R13: 0000000000000000 R14: 00007f006a7edfa0 R15: 00007ffedd9ff028 [ 831.718532][T20812] device sit0 entered promiscuous mode [ 834.137508][T20854] FAULT_INJECTION: forcing a failure. [ 834.137508][T20854] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 834.520022][T20854] CPU: 1 PID: 20854 Comm: syz.3.6934 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 834.531416][T20854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 834.541485][T20854] Call Trace: [ 834.544783][T20854] __dump_stack+0x21/0x24 [ 834.549119][T20854] dump_stack_lvl+0x169/0x1d8 [ 834.553801][T20854] ? show_regs_print_info+0x18/0x18 [ 834.559001][T20854] ? stack_trace_save+0x98/0xe0 [ 834.563852][T20854] dump_stack+0x15/0x1c [ 834.567999][T20854] should_fail+0x3c1/0x510 [ 834.572406][T20854] should_fail_usercopy+0x1a/0x20 [ 834.577420][T20854] _copy_from_user+0x20/0xd0 [ 834.582001][T20854] __copy_msghdr_from_user+0xaf/0x5e0 [ 834.587378][T20854] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 834.592663][T20854] ? __fsnotify_parent+0x5f5/0x6c0 [ 834.597770][T20854] ___sys_sendmsg+0x156/0x260 [ 834.602441][T20854] ? __sys_sendmsg+0x250/0x250 [ 834.607209][T20854] ? rw_verify_area+0x1c0/0x360 [ 834.612202][T20854] ? __fdget+0x1a1/0x230 [ 834.616447][T20854] __x64_sys_sendmsg+0x1e2/0x2a0 [ 834.621385][T20854] ? fput+0x1a/0x20 [ 834.625182][T20854] ? ___sys_sendmsg+0x260/0x260 [ 834.630018][T20854] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 834.636063][T20854] do_syscall_64+0x31/0x40 [ 834.640460][T20854] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 834.646329][T20854] RIP: 0033:0x7f233f524929 [ 834.650725][T20854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 834.670308][T20854] RSP: 002b:00007f233db8d038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 834.678841][T20854] RAX: ffffffffffffffda RBX: 00007f233f74bfa0 RCX: 00007f233f524929 [ 834.686798][T20854] RDX: 000000002000c041 RSI: 0000200000000540 RDI: 0000000000000004 [ 834.694752][T20854] RBP: 00007f233db8d090 R08: 0000000000000000 R09: 0000000000000000 [ 834.702701][T20854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 834.710657][T20854] R13: 0000000000000000 R14: 00007f233f74bfa0 R15: 00007ffcf163acb8 [ 835.864045][ T24] audit: type=1400 audit(1749586824.879:163): avc: denied { create } for pid=20866 comm="syz.2.6938" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_nflog_socket permissive=1 [ 842.888066][T20927] bridge0: port 1(bridge_slave_0) entered blocking state [ 842.929931][T20927] bridge0: port 1(bridge_slave_0) entered disabled state [ 842.937406][T20927] device bridge_slave_0 entered promiscuous mode [ 842.960731][T20927] bridge0: port 2(bridge_slave_1) entered blocking state [ 842.967777][T20927] bridge0: port 2(bridge_slave_1) entered disabled state [ 843.030236][T20927] device bridge_slave_1 entered promiscuous mode [ 843.038733][T20941] device bridge_slave_0 entered promiscuous mode [ 843.287783][T20927] bridge0: port 2(bridge_slave_1) entered blocking state [ 843.295081][T20927] bridge0: port 2(bridge_slave_1) entered forwarding state [ 843.302383][T20927] bridge0: port 1(bridge_slave_0) entered blocking state [ 843.309435][T20927] bridge0: port 1(bridge_slave_0) entered forwarding state [ 843.521700][T17324] bridge0: port 1(bridge_slave_0) entered disabled state [ 843.534730][T17324] bridge0: port 2(bridge_slave_1) entered disabled state [ 843.591765][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 843.604903][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 843.640948][ T296] device veth1_macvtap left promiscuous mode [ 843.941672][T20957] device sit0 left promiscuous mode [ 844.033434][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 844.045219][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 844.094939][T17324] bridge0: port 1(bridge_slave_0) entered blocking state [ 844.102031][T17324] bridge0: port 1(bridge_slave_0) entered forwarding state [ 844.153713][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 844.168914][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 844.238255][T17324] bridge0: port 2(bridge_slave_1) entered blocking state [ 844.245392][T17324] bridge0: port 2(bridge_slave_1) entered forwarding state [ 844.344332][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 844.364995][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 844.387345][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 844.403735][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 844.430449][T20958] device sit0 entered promiscuous mode [ 844.757676][T20927] device veth0_vlan entered promiscuous mode [ 844.813363][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 844.870966][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 844.954490][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 845.040085][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 845.147947][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 845.179736][T17324] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 845.236488][T20979] syz.1.6969[20979] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 845.236563][T20979] syz.1.6969[20979] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 845.317798][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 845.460610][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 845.541009][T20927] device veth1_macvtap entered promiscuous mode [ 845.640238][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 845.648179][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 845.658451][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 845.691403][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 845.740624][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 847.618195][T21034] device pim6reg1 entered promiscuous mode [ 847.742076][T21041] device sit0 left promiscuous mode [ 847.796881][T21042] device sit0 entered promiscuous mode [ 849.879876][T21096] device sit0 left promiscuous mode [ 849.918237][T21097] device sit0 entered promiscuous mode [ 851.237208][T21120] device syzkaller0 entered promiscuous mode [ 852.602902][T21133] FAULT_INJECTION: forcing a failure. [ 852.602902][T21133] name failslab, interval 1, probability 0, space 0, times 0 [ 852.800591][T21133] CPU: 0 PID: 21133 Comm: syz.2.7015 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 852.811991][T21133] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 852.822040][T21133] Call Trace: [ 852.825328][T21133] __dump_stack+0x21/0x24 [ 852.829653][T21133] dump_stack_lvl+0x169/0x1d8 [ 852.834319][T21133] ? show_regs_print_info+0x18/0x18 [ 852.839505][T21133] dump_stack+0x15/0x1c [ 852.843644][T21133] should_fail+0x3c1/0x510 [ 852.848048][T21133] ? tipc_msg_build+0xd0/0xc90 [ 852.852787][T21133] __should_failslab+0xa4/0xe0 [ 852.857528][T21133] should_failslab+0x9/0x20 [ 852.862006][T21133] __kmalloc_track_caller+0x5f/0x320 [ 852.867267][T21133] ? kmem_cache_alloc+0x165/0x2e0 [ 852.872269][T21133] ? proc_pident_lookup+0x1c0/0x270 [ 852.877439][T21133] ? __alloc_skb+0x9e/0x520 [ 852.881918][T21133] ? tipc_msg_build+0xd0/0xc90 [ 852.886653][T21133] __alloc_skb+0xdc/0x520 [ 852.890955][T21133] tipc_msg_build+0xd0/0xc90 [ 852.895521][T21133] ? tipc_node_get_mtu+0x2b0/0x2b0 [ 852.900609][T21133] __tipc_sendmsg+0x1270/0x2be0 [ 852.905449][T21133] ? tipc_sk_publish+0x3f0/0x3f0 [ 852.910592][T21133] ? memcpy+0x56/0x70 [ 852.914560][T21133] ? avc_has_perm+0x234/0x360 [ 852.919228][T21133] ? avc_has_perm_noaudit+0x240/0x240 [ 852.924599][T21133] ? 0xffffffffa0002000 [ 852.928747][T21133] ? __kasan_check_write+0x14/0x20 [ 852.933840][T21133] ? _raw_spin_lock_bh+0x8e/0xe0 [ 852.938753][T21133] ? _raw_spin_lock_irq+0xe0/0xe0 [ 852.943752][T21133] ? __local_bh_enable_ip+0x53/0x80 [ 852.948925][T21133] ? local_bh_enable+0x1f/0x30 [ 852.953660][T21133] ? lock_sock_nested+0x1f5/0x290 [ 852.958659][T21133] ? sock_init_data+0xc0/0xc0 [ 852.963309][T21133] ? wait_woken+0x180/0x180 [ 852.967788][T21133] ? kasan_set_track+0x5b/0x70 [ 852.972523][T21133] ? kasan_set_track+0x4a/0x70 [ 852.977260][T21133] tipc_sendmsg+0x55/0x70 [ 852.981584][T21133] ? tipc_recvmsg+0x13a0/0x13a0 [ 852.986407][T21133] ____sys_sendmsg+0x5a2/0x8c0 [ 852.991149][T21133] ? __sys_sendmsg_sock+0x40/0x40 [ 852.996151][T21133] ? import_iovec+0x7c/0xb0 [ 853.000664][T21133] ___sys_sendmsg+0x1f0/0x260 [ 853.005316][T21133] ? __sys_sendmsg+0x250/0x250 [ 853.010050][T21133] ? rw_verify_area+0x1c0/0x360 [ 853.014879][T21133] ? __fdget+0x1a1/0x230 [ 853.019098][T21133] __x64_sys_sendmsg+0x1e2/0x2a0 [ 853.024007][T21133] ? fput+0x1a/0x20 [ 853.027789][T21133] ? ___sys_sendmsg+0x260/0x260 [ 853.032615][T21133] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 853.038653][T21133] do_syscall_64+0x31/0x40 [ 853.043045][T21133] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 853.048910][T21133] RIP: 0033:0x7f006a5c6929 [ 853.053301][T21133] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 853.072881][T21133] RSP: 002b:00007f0068c2f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 853.081270][T21133] RAX: ffffffffffffffda RBX: 00007f006a7edfa0 RCX: 00007f006a5c6929 [ 853.089218][T21133] RDX: 000000002000c041 RSI: 0000200000000540 RDI: 0000000000000004 [ 853.097167][T21133] RBP: 00007f0068c2f090 R08: 0000000000000000 R09: 0000000000000000 [ 853.105115][T21133] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 853.113064][T21133] R13: 0000000000000000 R14: 00007f006a7edfa0 R15: 00007ffedd9ff028 [ 854.351884][T21160] bridge0: port 2(bridge_slave_1) entered disabled state [ 854.368974][T21160] bridge0: port 1(bridge_slave_0) entered disabled state [ 854.893259][T21167] device bridge_slave_1 left promiscuous mode [ 854.903621][T21167] bridge0: port 2(bridge_slave_1) entered disabled state [ 855.003216][T21167] device bridge_slave_0 left promiscuous mode [ 855.019538][T21167] bridge0: port 1(bridge_slave_0) entered disabled state [ 857.018002][ T24] audit: type=1400 audit(1749586845.999:164): avc: denied { create } for pid=21204 comm="syz.5.7038" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 857.169439][ T24] audit: type=1400 audit(1749586846.199:165): avc: denied { attach_queue } for pid=21210 comm="syz.3.7040" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 863.294797][T21300] syz.1.7066[21300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 863.294854][T21300] syz.1.7066[21300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 863.805627][T21300] device veth0_vlan left promiscuous mode [ 863.924335][T21300] device veth0_vlan entered promiscuous mode [ 864.092432][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 864.184202][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 864.227010][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 867.436627][T21397] tun0: tun_chr_ioctl cmd 1074025692 [ 869.129668][T21448] device pim6reg1 entered promiscuous mode [ 869.171222][T21454] device veth1_macvtap left promiscuous mode [ 869.407777][T21461] device veth1_macvtap entered promiscuous mode [ 869.510952][T21461] device macsec0 entered promiscuous mode [ 869.928070][T21471] GPL: port 1(erspan0) entered blocking state [ 869.979225][T21471] GPL: port 1(erspan0) entered disabled state [ 869.988325][T21471] device erspan0 entered promiscuous mode [ 869.995595][T21473] GPL: port 1(erspan0) entered blocking state [ 870.001722][T21473] GPL: port 1(erspan0) entered forwarding state [ 870.368085][T21483] device veth1_macvtap left promiscuous mode [ 870.621144][T21496] device veth1_macvtap entered promiscuous mode [ 870.627561][T21496] device macsec0 entered promiscuous mode [ 871.068712][ T24] audit: type=1400 audit(1749586860.119:166): avc: denied { create } for pid=21501 comm="syz.3.7134" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 871.174015][T21517] device syzkaller0 entered promiscuous mode [ 882.298320][T21791] device syzkaller0 entered promiscuous mode [ 882.573402][T21796] device pim6reg1 entered promiscuous mode [ 887.889152][T21888] device pim6reg1 entered promiscuous mode [ 892.947913][T21933] device sit0 left promiscuous mode [ 893.129338][T21938] device sit0 entered promiscuous mode [ 896.072602][T22014] syz.4.7298 uses obsolete (PF_INET,SOCK_PACKET) [ 901.056597][T22102] device syzkaller0 entered promiscuous mode [ 901.272506][T22107] device sit0 left promiscuous mode [ 901.416373][T22096] device sit0 entered promiscuous mode [ 903.137911][T22136] device sit0 left promiscuous mode [ 903.172327][T22141] device sit0 entered promiscuous mode [ 903.873205][T22153] device pim6reg1 entered promiscuous mode [ 914.544408][T22246] device syzkaller0 entered promiscuous mode [ 917.658544][T22273] device veth0_vlan left promiscuous mode [ 917.716237][T22273] device veth0_vlan entered promiscuous mode [ 917.933190][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 917.973482][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 918.073440][ T3942] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 919.232233][T22292] device sit0 left promiscuous mode [ 923.415834][T22313] tap0: tun_chr_ioctl cmd 1074025675 [ 923.572643][T22313] tap0: persist enabled [ 923.651240][T22309] tap0: tun_chr_ioctl cmd 1074025675 [ 923.657035][T22309] tap0: persist disabled [ 926.315035][T22360] device wg2 left promiscuous mode [ 926.499045][T22363] device wg2 entered promiscuous mode [ 927.683207][T22398] device veth1_macvtap left promiscuous mode [ 927.999536][T22399] device veth1_macvtap entered promiscuous mode [ 928.005986][T22399] device macsec0 entered promiscuous mode [ 941.345226][T22596] device sit0 left promiscuous mode [ 946.804533][T22633] device sit0 entered promiscuous mode [ 955.216106][T22715] device veth0_vlan left promiscuous mode [ 955.240244][T22715] device veth0_vlan entered promiscuous mode [ 957.626972][T22770] device sit0 entered promiscuous mode [ 958.422905][T22778] €Â0: renamed from pim6reg1 [ 960.759564][T22856] syzkaller0: refused to change device tx_queue_len [ 961.147417][T22867] device sit0 left promiscuous mode [ 961.313606][T22867] device sit0 entered promiscuous mode [ 963.780066][T22915] ÿÿÿÿÿÿ: renamed from vlan1 [ 963.949340][T22919] ÿÿÿÿÿÿ: renamed from vlan1 [ 970.064807][T23040] syz.3.7604[23040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 970.064878][T23040] syz.3.7604[23040] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 974.956723][T23127] device sit0 left promiscuous mode [ 977.109156][T23186] device sit0 left promiscuous mode [ 977.212031][T23186] device sit0 entered promiscuous mode [ 977.961079][T23197] syzkaller0: tun_chr_ioctl cmd 2147767506 [ 978.653133][T23222] device sit0 left promiscuous mode [ 978.811919][T23222] device sit0 entered promiscuous mode [ 979.519614][T23229] device sit0 left promiscuous mode [ 979.665837][T23231] device sit0 entered promiscuous mode [ 980.329263][T23265] device sit0 left promiscuous mode [ 980.495570][T23271] device sit0 entered promiscuous mode [ 983.667595][T23357] device veth0_vlan left promiscuous mode [ 983.673942][T23357] device veth0_vlan entered promiscuous mode [ 983.709061][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 983.730838][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 983.817377][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready