last executing test programs: 5.24667294s ago: executing program 1 (id=6888): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x101}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x6, 0x600, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f0000000380)='GPL\x00', 0x9, 0x73, &(0x7f00000003c0)=""/115, 0x41000, 0x20, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b40)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000b80)={0x0, 0x5, 0x4, 0x6}, 0x10, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000c00)=[{0x5, 0x2, 0x2, 0x5}, {0x2, 0x1, 0x9, 0x3}, {0x2, 0x1, 0xa}, {0x2, 0x3, 0x2, 0x2}, {0x4, 0x2, 0x4, 0x5}, {0x8, 0x1, 0x7, 0x3}], 0x10, 0x2, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, 0x0, &(0x7f00000005c0)=""/155}, 0x20) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0xe, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x4, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffff9}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) unlink(0x0) 3.413060057s ago: executing program 4 (id=6910): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) close(r0) 3.350658309s ago: executing program 0 (id=6912): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) close(r0) 3.26789499s ago: executing program 4 (id=6913): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f600"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000", @ANYRES32, @ANYBLOB='\x00'/13, @ANYRES32=0x0, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f00000007c0)=ANY=[@ANYBLOB="bf16000000000000b70700000200f0ff4070000000000000480000000000e1ff95000000000000002ba7e1d30cb599e83f040000f300000000bd01212fb56f040026fbfefc41056bd8174b79ed317142fa9ea4158123751c5c652fbc1626cca2a2ad75806150ae0209e62f51ee988e6e06c8206ac6879fc404004900c788b277be1cb79b0a4dcf23d410f6accd3641110bec4e90a634199e07f8f6eb968f200e011ea665c45a3449abe802f5ab3e89cf6cfdffffffb8580218ce740068720000074e8b1715807ea0ca469e468eea3fd2f73902ebcfcf49822775985bf313405b367e81c700000040000000000200000000005335000000143ea70c2ab40c7cb70cc8943a6d60d7c4900282e147d08e0af4b29df814f5691db43a5c00000004000000000089faff01210cce39bf405f1e846c12423a164a330100846f26ad03dd65873d9f87463ad6f7c2e8ee1a39244960b318778f2a047f6d5bc24fef5d7d6155102b1ced1e8019e63c850af895abba14f6fbd7fb5e2a431ab914040000000000010092c9f4609646b6c5c29647d2f950a959cf9938d6dfcb8ed2cbdc2ba9d580609e31c3fa90812a533ce206e7e57a79d6fce424c2204dd418c005479ecab19bdfb15a32a4fd67ce446adb431d07db79240acaf091231b986e77d05d988d6efdffdf48dca02113a38300cabf2b5543ffc166955709009e000000000061629d1822f720ec23812770d72c700a44e113d17088fdd00600000f7889b8c7044f56ff030000000000006cd4970400cac6f45a6922ded2e29514af463f747c08f4010586903500000000000000000000be34cf0f9d640dd782ac0cbc46903243d0d0f4bc7f253d0500000032daaf281c450e64c33aac8ff7e7d1c94c4505a9839688b008c370494f6734b771546d9552d3bb2da0d000000000000000009125c97f0400f5e1671bc5eb7739daa7820a91cb0e732df2ae1d39c747e00a4fbfe8942fa859cd28bdaa1509309926c77fbcb15ec58b42b400005a6b649dd5f13cd776e6c7c4b5c4b0de20e033b378553ead4c8cc530b62c36364e6505992209bdbc6203da7a3797246a6adef071102f0aa2c40095ddd05176f5cb8bd99e1ba0f9568f3e3876bba7bf973334e7919a080000000000000004fb996ad919f7e9672ce107000000ad882f2aead166c94500be902ee7dabc768eb9ec13f334aae90981ecaf5f744f22f2e45afe2c9e8632276cffe5f1fc215c0797d0244cf1ce269d10525745caaa3f77d1b80116cb9a38400242010000000100000091a0116f4693133138583da5e10b434697b0443b7b4ddfb3ace29e16e5a881336aad0974269a1025f2a9a135c0508af1aec2926627b43bba1229a7466bdca64f514b7911458da083e8681916d408d753226a83ae2434ccd3fc508216aea86833030f569d61dc998620fcf4eeb92e7bc511df63c53b82514493b8f3c74f44ba184d40e87612024da1a1ebe316923865f037c01d71b5de81121046d84b18acb5cbea7eecad9b6dd46ed83515cd9f140e5f00019be25b5910a3193e90be231a05fd82e6003969c3f081ff1d0eb50a04d14644234828cbb5aaa0ece702abdd425fa25ae04a2315c89064df633700000000d9e5953ea67310993d01000000000000003ac753358791b1490273ca535e05b11d815237743a5b79ad45de2a3c91257f02c2f30f5513662809073710937ed0055b238f466e1442f8ec7a5b394228035039ceeb452dca75f9ff5332b4c4777a58a0aa9a821667c68549e9da89ad4274ce2d3d7619936768a84a1465fff4eedba55955434f132ab7b8840558b3f918d675a79907a72a8252cd3fbaea5d3006a03507838231a335ae759ed25534f2e90a7def4b3d4af7fd47ab1a701e4b7a7dfc1d12775ed0a31bc7b5855880aa767e68196c7aa5ac115724b6cb8fcebb67719eccd87b06b38566cf61ad2f307a79d2ce9801837bf0bd3af0271de700eef2795d28cb0017000000000000000000e052d93194121b774d21a0317d0346078400004652c769fd3d3e661a2fb5ff0f000002ab2ac4eb3f19c042163e0bdb88b82de384a8055e8b1e24294b0546cce481ff5618b7b9585dbb64d66debf219fa479abf22f3d64fe82e466ea6f27859946e72f80bb1c9cfcde57b79625e2979fe689a5a246cbbdf6ad488f43f46b2536f175f46dfb27d5229467270246ab53616c46edf34c559d3de0c59ca3305e66825715e5e4cd5b54c1b05c09f04337a76a30373baac3ecec91fd546eb7c32dbecb18a308a0004be94dfab28c2a51dc856df0000000000c12254f041804f7f7074356789b1d4dd55f3e045a48241a4ce04d06acb2cf11eab759ba78da5da0f26126d4cf2c73e5f94030000040000000000000000c301985d603403592486204054be3fdda91f9e315886941928e5a8bc1a00e69a98c0a8f7192f6ee93cc4124cf4e7610915efc08c834a44e1d685d6835a40b5bc615949cbcd98d0e68d7eef5d32d5fcc7923d7544fa492aa38717481455e86dcd7816ad8940bd1995369d89ae6eadeb9117e8b94ab422c8d62f858875dccdbc89572231ef5d6df6a9c55f8df763c7c64da7cc017e1e3f5cd4cb9fe6d19b11d4d38239d318016e622b9683b7e46be64dc097982e23462392a0cd05afb2e060fd42ef00dfbd057311aab94f307d10c7a1af0d8e5a0fcb547475d13c0000000000000000f1cc97103d714d1abb901f866d9d629b4fb185f45790517c4a0f5c6a5024e3359e8d83e3f6edf9e2afb5ab59c7b2b45cfb0a3c1303a98e4ed531ac11cca1cd744b431de74c7cd6533adaa8ec749061b2959d53da626aa189781dc1be4d5c81aebc0cada819895b377d6cf0a7878ba99864ae84464744c605646caf2e06b13eba7ba10acf77d91b2297e9573abb0a4da534d735a223626402b308daf7835780fa6f4e410000000000fb00000000000000000000b14952139bd4bdbccc5e334c49584655c4fce8c5bb7c54664aef6d780100358aa54b4b49926c4be9ee4659153d9fa95d07cc4efdab2c5f4503148d0255d0b748366dafe042d78479c21d832e1431ed6d646d13e8e7230300920a5642bbed1dee9b46b6f02e572024ccf3c8edd82660e5d74c22e46af480c300000000000000000000000000000000000044ff72f96f084f4b6cdcb1b4a9d8e9f99f1b85497d0c3df704c8a0034c09caeeb0e34799b755649883539258a7b33dcef15d8fd1953ebaaa3cff81a0de7a05a440f20f6b273ceb8678f10378b670be7504dabd1471355d853292775d0366891f0bcf0a6087ed4f1f25ef52394db3e9d8318bbb9baff3db95bfd68a08ded502cc08a485c804e4fd107a7ca2a64ca081c6b2f7b895cdf98b763ebab9451c65eced6f5f97a541210806d885762ac3150225036c7eccd7a05593abd963f9a02df58085115e54f675e6a08d25b5722cabf989b4bbc562e073b81bae61f05c5e1f90e021340b60cc5fb8fdb09b6d20b0d87a6ed800000000000000000000000000000000006cc6f64f583a26a78f7f417f66c0af32f5194ddfce51e5aff28f621bb2fd2a5ab719823488d6e869b08d3d4ac7950c60144cf77437e29895a23282e3c65e015d1c334832a90ee77d93596e3f12e9ca8c67c7f3c9b66c9cb03edec184ad1d9544c7a3be250e471dca00000078544d79c0efe4094e561eeb26ee4c81106d03c004bc1589ef6e13648999c8735e2634e89aaa90c571fa3c07238697b1db783c52715055445e96995fe3273b0346b03fc742c06aa3947e0d9cf0c99b5e245ede85893112deea8bd3355a32ec15e1242f170a51f28cea4105541e96a52da4984d26bd29cb0623f00c6b0a4c00ad406d729babc9d1550a683c349017a340444000000000000000000000920ca49f7cc8194aaebdcae5a62bb7587b57f41f1c2034911f23e6bd0291b3319f03a0a15dea685a8ab75b3c60391afa5483231305402b52a8f98638009c142751518f73a847ca583e855d70c6a4a53f61ad753d5e740db44afd32b019d9e8b41361c2c1b9a8a14604fe52837a19dd6952fe2724c0105ab158a54a4a23ff0f4bc43c0e0e426e51258e40bb4b68ff4e3a8fe314a0"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) close(r3) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000780)=r2, 0x4) sendmsg$inet(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000200)="fa82", 0x3802}], 0x1}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r4}, 0x10) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x8148}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB, @ANYRES32], 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) syz_clone(0x4000c0fe, 0x0, 0x0, 0x0, 0x0, 0x0) 2.913082435s ago: executing program 0 (id=6921): ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000095000000000000003f64ecb21ed7d74b542e43ae9f57f61af1c5b6016901992307df92d7c26b05a7da0582d208fd1f57c41cee38c7023e71dc864ab49f7894dd5ee29721d0625ee50c8aeca9b5090d85ff1c5df40229f0981507171aec7dc97abd981893d51a27e8a1033fa344fa3c6c27705648a66a47e0a1bc8fcede095704453c77f6c5370191ab55c423aae05729e69c987cf5f9aa2fd88c9e2114f53b9f82157c197397e43647b083db79f1f2"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x20c9, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000a00)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000440)={0x0, r1}, 0x10) write$cgroup_pid(r0, &(0x7f0000000000), 0x2a979d) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback=0x13, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)='..\x00') syz_open_procfs$namespace(0x0, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) r5 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000580)={r6, 0xe0, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x7, &(0x7f0000000280)=[0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xa6, &(0x7f0000000380)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x3c, 0x8, 0x8, &(0x7f0000000440)}}, 0x10) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000880)={r6, 0x20, &(0x7f0000000600)={&(0x7f0000000780)=""/215, 0xd7, 0x0, &(0x7f00000006c0)=""/89, 0x59}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r11, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001cc0)={r0, 0x58, &(0x7f0000001c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000001d80)={r6, 0xffffffffffffffff}, 0x4) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000001dc0)=@base={0xc, 0xfffffffc, 0x4, 0xfff, 0x2022, r0, 0x7, '\x00', r7, r6, 0x4, 0x5, 0x3, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000001e80)={0x4, 0x14, &(0x7f0000001b00)=@raw=[@map_idx_val={0x18, 0x7, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x400}, @call={0x85, 0x0, 0x0, 0x9d}, @map_fd={0x18, 0x1, 0x1, 0x0, r11}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r6}}, @map_val={0x18, 0x5, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x2}, @map_idx={0x18, 0x8, 0x5, 0x0, 0xb}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}], &(0x7f0000001bc0)='GPL\x00', 0x7, 0x19, &(0x7f0000001c00)=""/25, 0x0, 0x1, '\x00', r12, @fallback=0x15, 0xffffffffffffffff, 0x8, &(0x7f0000001d00)={0x4, 0x4}, 0x8, 0x10, &(0x7f0000001d40)={0x4, 0x6, 0x0, 0xfffffff7}, 0x10, r8, r5, 0x0, &(0x7f0000001e40)=[r3, r0, r6, r3, r0, 0x1, r13, r14], 0x0, 0x10, 0xfffffff8, @void, @value}, 0x94) r15 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f00000008c0)={0xffffffffffffffff, 0x3, 0x10}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x1b, 0x10, &(0x7f0000000200)=@raw=[@cb_func={0x18, 0x2}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffa}, @exit, @jmp={0x5, 0x0, 0xd, 0xb, 0x0, 0xffffffffffffffff, 0xfffffffffffffffc}, @tail_call={{0x18, 0x2, 0x1, 0x0, r6}}, @exit, @jmp={0x5, 0x0, 0x7, 0x5, 0x2, 0x50, 0xfffffffffffffffc}, @ldst={0x0, 0x3, 0x3, 0x7, 0xa, 0x20, 0x10}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}], &(0x7f0000000040)='GPL\x00', 0xf546, 0x1000, &(0x7f0000000b00)=""/4096, 0x40f00, 0x50, '\x00', r7, @fallback=0x25, r0, 0x8, &(0x7f00000005c0)={0x5, 0x3}, 0x8, 0x10, 0x0, 0x0, r9, 0xffffffffffffffff, 0x0, &(0x7f0000000900)=[r15, r6, r6], 0x0, 0x10, 0x2e35cb1d, @void, @value}, 0x94) 2.60409451s ago: executing program 1 (id=6924): close(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) sendmsg$tipc(r3, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0x0) 2.524664331s ago: executing program 2 (id=6925): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001880)={{r1}, &(0x7f00000006c0), &(0x7f0000000700)='%ps \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 2.428751833s ago: executing program 2 (id=6929): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x4c, 0x1, 0x0, 0x0, 0x0, 0x210e, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8003, 0xaea}, 0x110104, 0x32, 0x0, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1b0000000000000000000000008000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xfb, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b80)={{}, &(0x7f0000000980), &(0x7f0000000b40)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r1}, 0x0, &(0x7f00000005c0)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f00000001c0)={0x2}, 0x8) bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) r4 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000012c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x41420, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r4, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 2.349658684s ago: executing program 2 (id=6932): bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00000000000000c8f140a0aad331ff6754696f74e1762653685eb8aa6fdc977fd66da5e2d388ee253e3714255e2b", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="00000003000000000000000000000000000000e6", @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x2}, 0xc002, 0x1, 0x0, 0x0, 0x0, 0x0, 0x29, 0x0, 0x4f8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x101000, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) mkdir(&(0x7f0000000000)='./file0\x00', 0x180) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r4, 0xc004743e, 0x110e22fff6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000005"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000001007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x18) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000580)=@generic={&(0x7f0000000400)='./file0\x00', r3}, 0x18) 2.325176434s ago: executing program 4 (id=6933): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b70300000000000085000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x7, 0xf9, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe8000000000000010"], 0xfdef) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) 2.308616084s ago: executing program 4 (id=6934): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x101}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x6, 0x600, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f0000000380)='GPL\x00', 0x9, 0x73, &(0x7f00000003c0)=""/115, 0x41000, 0x20, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b40)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000b80)={0x0, 0x5, 0x4, 0x6}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000bc0), &(0x7f0000000c00)=[{0x5, 0x2, 0x2, 0x5}, {0x2, 0x1, 0x9, 0x3}, {0x2, 0x1, 0xa}, {0x2, 0x3, 0x2, 0x2}, {0x4, 0x2, 0x4, 0x5}, {0x8, 0x1, 0x7, 0x3}], 0x10, 0x2, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, 0x0, &(0x7f00000005c0)=""/155}, 0x20) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0xe, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x4, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffff9}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) unlink(0x0) 2.266746085s ago: executing program 2 (id=6935): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x1e, 0x4, &(0x7f0000000000)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x17}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000280)={'pim6reg1\x00', 0x2}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001880)={{r1}, &(0x7f00000006c0), &(0x7f0000000700)='%ps \x00'}, 0x20) openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000140)={'geneve0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) 2.087596878s ago: executing program 2 (id=6936): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000073"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @link_local}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r2}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='qdisc_destroy\x00', r4}, 0x10) close(r0) 2.046368179s ago: executing program 0 (id=6938): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x14, 0x4, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0xfffffffe, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000300)='cpuacct.stat\x00', 0x26e1, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)=r1}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8922, &(0x7f0000000040)={'macsec0\x00'}) 1.99248392s ago: executing program 0 (id=6940): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)=@generic={&(0x7f0000000100)='./file0\x00', r0}, 0x18) 1.987586819s ago: executing program 2 (id=6942): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x3c, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000000023a2beac8ff399487aeffc05bb146e3828c7b733f3565f0cf16bf9037ce244fc9979d05ff025ff8422890bb502a9f4bf11bc3e6bffb612666c3de0ef7c82c71b988885bbbf1b2fa872b432abace21a04bac1de91ff130b298e9aa2a2ee530b0cb9f21b11db7fa0227fbd398052a82579f1d97ecbd7d222526265f2705d351f0c9fc52e2603a6"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x0, 0xa, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x61980, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') socketpair(0x29, 0x80809, 0x7fff, &(0x7f0000001000)={0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000002680)={&(0x7f0000001040)=@nameseq={0x1e, 0x1, 0x2, {0x42, 0x4}}, 0x10, &(0x7f0000001600)=[{&(0x7f0000001080)="35f16e2e4c8e50509ef368ddc3df0807232331cfc94642fe06e209601841cfbd793f09bb431432c0923df808d7468e105cfa65823c531b428ef373f400fd5340af285b5e51495d244172da84aa6cbc40bdd38026421c0ca0b2eb5f28be4795209e665f8f58b04ba983069a433598b0", 0x6f}, {&(0x7f0000001140)}, {&(0x7f0000001180)="0bf208c0fb3b282dab6b6ef9d3b69c67a7f449a5facfad59acc1950f405aaa70abc70a72bef2eaeb3fbab2fa73ddd37e1a49175badd2811542cbb53e5bc7df69577d8ed6f295381e4b00136fb2866826e490f2176d6e94cb19ee48403a14509317d967fca47111582ba2814e098d2d9ac24a6d565cfc0bd4e6c7f58c3ad7860208ac36a8d25eee2b257fc42b4f167bd39022e6d660f06e712004eee5bcf9822db0ff1d3a47a0e163ee8d04abd37c33923a136b97f3470dd744b5d330295013aeda2b449c4147853eeb41fd1febdcef55a4fd588a5b7e11b503b86aa82adb213c9062531b3204b9ada217b131613bee73653b1b", 0xf3}, {&(0x7f0000001340)="d27bb8a9401c6f2bdab9728363c7edff777bde2329cfdbae451b3928e12cd4cfc06388ab6a92fd2086b4cd53f31df6fe8462d9e8b19061f519b8f5644688aef584eaa4aca9a047a66331f770d008d58fcafad7e07346956412edd58e2d4dbff86bf2274ff87a2a8d252bdd5e4961d7ba94752a5dc0bdf5a809687586952c14f36a0063fa80aba853cd8b593bf3387a108130", 0x92}, {0x0}, {&(0x7f00000014c0)="7f76b5db1614c0cff4434e5a3784621a2e8213d427fe6673a017581de0de4f2989e825175e9548cb31c7f5cc1f2703433085134037bf6d00189f19b42f80f8541efedeaabb16f5f3897bd2e8d47196a00bfb25c4fb3b891251dfe0de260d2c3a0b49ccd358ed9f29dba90d6569a9acd6b6ba988abf262563cf0b877b04cb9e13be982f1cd48230ff709b4d478523b4a1376c0e70d4d3b2f90bce6e287d5ec1075ecd819fc59555891c7205fb229876c3cb3521ba", 0xb4}], 0x6, &(0x7f0000001680)="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", 0x1000, 0x44}, 0x8005) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2d, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r6, 0x40047451, &(0x7f0000000180)) openat$ppp(0xffffffffffffff9c, &(0x7f0000001140), 0x40002, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010005000900000001"], 0x48) 1.932129611s ago: executing program 0 (id=6943): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x3c, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="160000000000000004000000ff00000000000000", @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000000000000023a2beac8ff399487aeffc05bb146e3828c7b733f3565f0cf16bf9037ce244fc9979d05ff025ff8422890bb502a9f4bf11bc3e6bffb612666c3de0ef7c82c71b988885bbbf1b2fa872b432abace21a04bac1de91ff130b298e9aa2a2ee530b0cb9f21b11db7fa0227fbd398052a82579f1d97ecbd7d222526265f2705d351f0c9fc52e2603a6"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x0, 0xa, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x61980, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8000, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000001c0)='cpu&00\t&&') socketpair(0x29, 0x80809, 0x7fff, &(0x7f0000001000)={0xffffffffffffffff}) sendmsg$tipc(r4, &(0x7f0000002680)={&(0x7f0000001040)=@nameseq={0x1e, 0x1, 0x2, {0x42, 0x4}}, 0x10, &(0x7f0000001600)=[{&(0x7f0000001080)="35f16e2e4c8e50509ef368ddc3df0807232331cfc94642fe06e209601841cfbd793f09bb431432c0923df808d7468e105cfa65823c531b428ef373f400fd5340af285b5e51495d244172da84aa6cbc40bdd38026421c0ca0b2eb5f28be4795209e665f8f58b04ba983069a433598b0", 0x6f}, {&(0x7f0000001140)}, {&(0x7f0000001180)="0bf208c0fb3b282dab6b6ef9d3b69c67a7f449a5facfad59acc1950f405aaa70abc70a72bef2eaeb3fbab2fa73ddd37e1a49175badd2811542cbb53e5bc7df69577d8ed6f295381e4b00136fb2866826e490f2176d6e94cb19ee48403a14509317d967fca47111582ba2814e098d2d9ac24a6d565cfc0bd4e6c7f58c3ad7860208ac36a8d25eee2b257fc42b4f167bd39022e6d660f06e712004eee5bcf9822db0ff1d3a47a0e163ee8d04abd37c33923a136b97f3470dd744b5d330295013aeda2b449c4147853eeb41fd1febdcef55a4fd588a5b7e11b503b86aa82adb213c9062531b3204b9ada217b131613bee73653b1b", 0xf3}, {&(0x7f0000001340)="d27bb8a9401c6f2bdab9728363c7edff777bde2329cfdbae451b3928e12cd4cfc06388ab6a92fd2086b4cd53f31df6fe8462d9e8b19061f519b8f5644688aef584eaa4aca9a047a66331f770d008d58fcafad7e07346956412edd58e2d4dbff86bf2274ff87a2a8d252bdd5e4961d7ba94752a5dc0bdf5a809687586952c14f36a0063fa80aba853cd8b593bf3387a108130", 0x92}, {0x0}, {&(0x7f00000014c0)="7f76b5db1614c0cff4434e5a3784621a2e8213d427fe6673a017581de0de4f2989e825175e9548cb31c7f5cc1f2703433085134037bf6d00189f19b42f80f8541efedeaabb16f5f3897bd2e8d47196a00bfb25c4fb3b891251dfe0de260d2c3a0b49ccd358ed9f29dba90d6569a9acd6b6ba988abf262563cf0b877b04cb9e13be982f1cd48230ff709b4d478523b4a1376c0e70d4d3b2f90bce6e287d5ec1075ecd819fc59555891c7205fb229876c3cb3521ba", 0xb4}], 0x6, &(0x7f0000001680)="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", 0x1000, 0x44}, 0x8005) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r1}, 0x0, &(0x7f0000000040)}, 0x20) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r6) r7 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x2d, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$TUNSETOFFLOAD(r7, 0xc004743e, 0x110e22fff6) ioctl$TUNGETVNETLE(r6, 0x40047451, &(0x7f0000000180)) openat$ppp(0xffffffffffffff9c, &(0x7f0000001140), 0x40002, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'pimreg0\x00', 0x7c2}) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010005000900000001"], 0x48) 564.633251ms ago: executing program 4 (id=6946): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000, 0x867b}, 0x14000, 0xc8, 0xfff, 0x0, 0x1, 0x0, 0x400}, 0xffffffffffffffff, 0x8, 0xffffffffffffffff, 0xa) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000001c0)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r5, &(0x7f0000000040)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6307e08102030000fe0ea66718330200975a65789ff57b00000000000000cade22000000000000ac9ccb"], 0xfdef) 549.914382ms ago: executing program 3 (id=6947): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="060000000400000004000000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000200)=ANY=[@ANYBLOB="1802000001000000000000000000000018010000786c6c2500000000070000007b1af8ff00000000bfa100000000000007010000f8ffffffb700000000000000b70300000000ffff850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8628a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) perf_event_open(&(0x7f0000000480)={0x2, 0x80, 0xde, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000200)=ANY=[], 0x13) 519.142992ms ago: executing program 4 (id=6948): socketpair$nbd(0x1, 0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x7, 0xf9, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, @perf_config_ext, 0x0, 0xb2, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000000040)={0x1, 0x0, [0x0]}) close(r1) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r4, &(0x7f0000000080), 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r4}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r4, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000980)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xa458, 0x5}, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000990a233a99212be12f3b038adc8f40b74e701d6d2f39308b"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2004, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x3) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xffd, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000b40)='neigh_create\x00', r8}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) 443.492863ms ago: executing program 3 (id=6949): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000380)={0x3, 0x80, 0x0, 0xa, 0xfe, 0x1, 0x0, 0x0, 0xc744c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x1, 0x6}, 0x40, 0xc8, 0x0, 0x0, 0x35, 0xe3bb, 0x0, 0x0, 0x4, 0x0, 0xfffffffffffffffc}, 0x0, 0x7, 0xffffffffffffffff, 0x9) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x2022) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="00000000000000000000000081"], 0x48) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xe) 411.742813ms ago: executing program 3 (id=6950): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x2000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000180)={0x0, r0}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x11, 0x2, &(0x7f00000001c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x4c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x50) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000004c0)={r3, &(0x7f0000000340), 0x0}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x7fffffff}, 0x0, 0x3, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x4000020020000007}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffff}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001080)={@cgroup, 0xffffffffffffffff, 0xe, 0x2038, 0xffffffffffffffff, @void, @void, @value}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, r5}, 0x38) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000a40)=ANY=[@ANYRES16=r0, @ANYRESHEX, @ANYBLOB="01100080", @ANYBLOB="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", @ANYRES32=r5], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) write$cgroup_int(r6, &(0x7f00000001c0)=0x60ff20038000, 0xfffffdef) 293.679575ms ago: executing program 1 (id=6951): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x45, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r1}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x19, 0x0, 0x0) 185.173127ms ago: executing program 1 (id=6952): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d0000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x52) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000700)='signal_generate\x00', r0}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) 184.822087ms ago: executing program 3 (id=6953): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="18000000000700000000000000000000850000"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x8f, &(0x7f00000002c0)=""/143, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000200)=@generic={&(0x7f0000000100)='./file0\x00', r0}, 0x18) 183.960447ms ago: executing program 1 (id=6954): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xae9, 0x30, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x2000, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000180)={0x0, r0}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000640)={0x11, 0x2, &(0x7f00000001c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x4c, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd0, 0x0, @void, @value}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000000800000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000040000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000040000008500000006000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x50) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f00000004c0)={r3, &(0x7f0000000340), 0x0}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x9b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x7fffffff}, 0x0, 0x3, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002ac0)={0x1a, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2008, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000009c0)={0x0, 0xffffffffffffffff, 0x0, 0x4000020020000007}, 0x18) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffff}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000001080)={@cgroup, 0xffffffffffffffff, 0xe, 0x2038, 0xffffffffffffffff, @void, @void, @value}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0x8, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, r5}, 0x38) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000a40)=ANY=[@ANYRES16=r0, @ANYRESHEX, @ANYBLOB="01100080", @ANYBLOB="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", @ANYRES32=r5], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r6 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) write$cgroup_int(r6, &(0x7f00000001c0)=0x60ff20038000, 0xfffffdef) 170.713407ms ago: executing program 3 (id=6955): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b70300000000000085000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x10000000}, 0x0, 0xc8, 0xffff, 0x7, 0xf9, 0x0, 0x2, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd6317ce22000000fffe8000000000000010"], 0xfdef) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xffffffffffffffae}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000000)=ANY=[], 0xfdef) 129.687078ms ago: executing program 3 (id=6956): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000080)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x220, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x101}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x6, 0x600, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x10000, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x1}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000c80)=@bpf_lsm={0x1d, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f0000000380)='GPL\x00', 0x9, 0x73, &(0x7f00000003c0)=""/115, 0x41000, 0x20, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, &(0x7f0000000b40)={0x5, 0x4}, 0x8, 0x10, &(0x7f0000000b80)={0x0, 0x5, 0x4, 0x6}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000bc0), &(0x7f0000000c00)=[{0x5, 0x2, 0x2, 0x5}, {0x2, 0x1, 0x9, 0x3}, {0x2, 0x1, 0xa}, {0x2, 0x3, 0x2, 0x2}, {0x4, 0x2, 0x4, 0x5}, {0x8, 0x1, 0x7, 0x3}], 0x10, 0x2, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, 0x0, &(0x7f00000005c0)=""/155}, 0x20) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0xe, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x4, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffff9}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) unlink(0x0) 49.688949ms ago: executing program 1 (id=6957): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r0}, 0x10) syz_clone(0x40004000, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="0e000080000004925604b5b04a961d00"/28, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) 0s ago: executing program 0 (id=6958): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800001f1a0068099b3c0000000000001860000000000000824d086bb227733218120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000000850000000c000000b700000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800"/110], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000600)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8000ef, 0x1af1ed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{}, &(0x7f0000000000), &(0x7f00000005c0)}, 0x20) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=@base={0x5, 0x7, 0x8, 0x5, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, @perf_config_ext={0x0, 0x1}, 0x18208, 0x3, 0x0, 0x0, 0x1000, 0x0, 0x3}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x80000000000, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0xf, 0x3}, 0x842a, 0x200000000000000, 0x7, 0x5, 0x0, 0x1ffffd, 0xfffc}, 0x0, 0x0, 0xffffffffffffffff, 0x3) close(0x4) kernel console output (not intermixed with test programs): ffffffffffffffda RBX: 00007f07f715efa0 RCX: 00007f07f6f37929 [ 485.274358][T13581] RDX: 0000000000000010 RSI: 0000200000000080 RDI: 0000000000000011 [ 485.283162][T13581] RBP: 00007f07f55a0090 R08: 0000000000000000 R09: 0000000000000000 [ 485.291711][T13581] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 485.300157][T13581] R13: 0000000000000000 R14: 00007f07f715efa0 R15: 00007ffe4c70d2a8 [ 487.307796][T13658] FAULT_INJECTION: forcing a failure. [ 487.307796][T13658] name failslab, interval 1, probability 0, space 0, times 0 [ 487.331260][T13658] CPU: 0 PID: 13658 Comm: syz.3.4564 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 487.343442][T13658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 487.353712][T13658] Call Trace: [ 487.357031][T13658] __dump_stack+0x21/0x24 [ 487.361803][T13658] dump_stack_lvl+0x169/0x1d8 [ 487.366731][T13658] ? thaw_kernel_threads+0x220/0x220 [ 487.372280][T13658] ? show_regs_print_info+0x18/0x18 [ 487.377588][T13658] dump_stack+0x15/0x1c [ 487.382013][T13658] should_fail+0x3c1/0x510 [ 487.389712][T13658] ? sk_prot_alloc+0xb2/0x340 [ 487.394797][T13658] __should_failslab+0xa4/0xe0 [ 487.399843][T13658] should_failslab+0x9/0x20 [ 487.404605][T13658] __kmalloc+0x60/0x330 [ 487.408806][T13658] sk_prot_alloc+0xb2/0x340 [ 487.413503][T13658] sk_alloc+0x38/0x4e0 [ 487.418708][T13658] ? _raw_spin_trylock_bh+0x130/0x130 [ 487.424657][T13658] pptp_create+0x32/0x2f0 [ 487.429049][T13658] pppox_create+0x124/0x180 [ 487.433778][T13658] __sock_create+0x38d/0x770 [ 487.438707][T13658] __sys_socketpair+0x218/0x590 [ 487.443581][T13658] __x64_sys_socketpair+0x9b/0xb0 [ 487.448740][T13658] do_syscall_64+0x31/0x40 [ 487.453578][T13658] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 487.459583][T13658] RIP: 0033:0x7f321ddd2929 [ 487.464441][T13658] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 487.485413][T13658] RSP: 002b:00007f321c43b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 487.494248][T13658] RAX: ffffffffffffffda RBX: 00007f321dff9fa0 RCX: 00007f321ddd2929 [ 487.503013][T13658] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 0000000000000018 [ 487.511539][T13658] RBP: 00007f321c43b090 R08: 0000000000000000 R09: 0000000000000000 [ 487.519931][T13658] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 487.528243][T13658] R13: 0000000000000000 R14: 00007f321dff9fa0 R15: 00007ffed3537c18 [ 487.957050][T13677] FAULT_INJECTION: forcing a failure. [ 487.957050][T13677] name failslab, interval 1, probability 0, space 0, times 0 [ 488.015308][T13677] CPU: 1 PID: 13677 Comm: syz.0.4571 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 488.027251][T13677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 488.037575][T13677] Call Trace: [ 488.040894][T13677] __dump_stack+0x21/0x24 [ 488.045404][T13677] dump_stack_lvl+0x169/0x1d8 [ 488.050198][T13677] ? show_regs_print_info+0x18/0x18 [ 488.055603][T13677] ? cpumask_next+0x12/0x30 [ 488.060398][T13677] dump_stack+0x15/0x1c [ 488.064676][T13677] should_fail+0x3c1/0x510 [ 488.069119][T13677] ? cpu_map_update_elem+0x56a/0xd40 [ 488.074436][T13677] __should_failslab+0xa4/0xe0 [ 488.079548][T13677] should_failslab+0x9/0x20 [ 488.084157][T13677] kmem_cache_alloc_trace+0x3a/0x2e0 [ 488.089551][T13677] cpu_map_update_elem+0x56a/0xd40 [ 488.095026][T13677] ? cpu_map_lookup_elem+0x100/0x100 [ 488.101068][T13677] bpf_map_update_value+0x19e/0x410 [ 488.106765][T13677] map_update_elem+0x4a1/0x5e0 [ 488.111664][T13677] __se_sys_bpf+0x398/0x680 [ 488.116447][T13677] ? __x64_sys_bpf+0x90/0x90 [ 488.121293][T13677] ? fpu__clear_all+0x20/0x20 [ 488.126004][T13677] __x64_sys_bpf+0x7b/0x90 [ 488.131274][T13677] do_syscall_64+0x31/0x40 [ 488.135809][T13677] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 488.142289][T13677] RIP: 0033:0x7f07f6f37929 [ 488.146820][T13677] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 488.168108][T13677] RSP: 002b:00007f07f55a0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 488.177100][T13677] RAX: ffffffffffffffda RBX: 00007f07f715efa0 RCX: 00007f07f6f37929 [ 488.185221][T13677] RDX: 0000000000000020 RSI: 0000200000000940 RDI: 0000000000000002 [ 488.193814][T13677] RBP: 00007f07f55a0090 R08: 0000000000000000 R09: 0000000000000000 [ 488.202331][T13677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 488.210585][T13677] R13: 0000000000000000 R14: 00007f07f715efa0 R15: 00007ffe4c70d2a8 [ 489.092739][T13711] FAULT_INJECTION: forcing a failure. [ 489.092739][T13711] name failslab, interval 1, probability 0, space 0, times 0 [ 489.118442][T13711] CPU: 0 PID: 13711 Comm: syz.1.4582 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 489.130371][T13711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 489.140852][T13711] Call Trace: [ 489.144355][T13711] __dump_stack+0x21/0x24 [ 489.149069][T13711] dump_stack_lvl+0x169/0x1d8 [ 489.154226][T13711] ? show_regs_print_info+0x18/0x18 [ 489.160146][T13711] dump_stack+0x15/0x1c [ 489.164736][T13711] should_fail+0x3c1/0x510 [ 489.169354][T13711] ? getname_kernel+0x59/0x2e0 [ 489.174140][T13711] __should_failslab+0xa4/0xe0 [ 489.178916][T13711] should_failslab+0x9/0x20 [ 489.183426][T13711] kmem_cache_alloc+0x3d/0x2e0 [ 489.188313][T13711] getname_kernel+0x59/0x2e0 [ 489.193860][T13711] kern_path+0x1f/0x40 [ 489.200402][T13711] create_local_trace_uprobe+0xa2/0x6c0 [ 489.208419][T13711] ? perf_uprobe_init+0x62/0x1a0 [ 489.214859][T13711] ? bpf_get_uprobe_info+0x4e0/0x4e0 [ 489.221488][T13711] ? __kasan_check_write+0x14/0x20 [ 489.227156][T13711] ? _copy_from_user+0x95/0xd0 [ 489.232839][T13711] perf_uprobe_init+0xf9/0x1a0 [ 489.237970][T13711] perf_uprobe_event_init+0x10b/0x190 [ 489.244004][T13711] perf_try_init_event+0x14a/0x430 [ 489.250356][T13711] perf_event_alloc+0xcda/0x1990 [ 489.256481][T13711] __se_sys_perf_event_open+0x5cc/0x1b10 [ 489.262775][T13711] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 489.268754][T13711] ? fpu__clear_all+0x20/0x20 [ 489.274240][T13711] __x64_sys_perf_event_open+0xbf/0xd0 [ 489.280556][T13711] do_syscall_64+0x31/0x40 [ 489.285086][T13711] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 489.291529][T13711] RIP: 0033:0x7f67f53e9929 [ 489.297194][T13711] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 489.317543][T13711] RSP: 002b:00007f67f3a52038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 489.326139][T13711] RAX: ffffffffffffffda RBX: 00007f67f5610fa0 RCX: 00007f67f53e9929 [ 489.335623][T13711] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000200000000000 [ 489.344342][T13711] RBP: 00007f67f3a52090 R08: 0000000000000000 R09: 0000000000000000 [ 489.353494][T13711] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 489.362081][T13711] R13: 0000000000000000 R14: 00007f67f5610fa0 R15: 00007ffda6d6f088 [ 490.600519][T13752] device syzkaller0 entered promiscuous mode [ 490.745599][T13759] FAULT_INJECTION: forcing a failure. [ 490.745599][T13759] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 490.774269][T13759] CPU: 1 PID: 13759 Comm: syz.2.4598 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 490.786717][T13759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 490.797193][T13759] Call Trace: [ 490.801542][T13759] __dump_stack+0x21/0x24 [ 490.805900][T13759] dump_stack_lvl+0x169/0x1d8 [ 490.810910][T13759] ? thaw_kernel_threads+0x220/0x220 [ 490.816852][T13759] ? show_regs_print_info+0x18/0x18 [ 490.822394][T13759] ? memcpy+0x56/0x70 [ 490.826733][T13759] dump_stack+0x15/0x1c [ 490.831278][T13759] should_fail+0x3c1/0x510 [ 490.835989][T13759] should_fail_usercopy+0x1a/0x20 [ 490.841517][T13759] _copy_to_user+0x20/0x90 [ 490.846343][T13759] bpf_verifier_vlog+0x1b4/0x330 [ 490.851982][T13759] __btf_verifier_log+0xd1/0x120 [ 490.857993][T13759] ? btf_check_sec_info+0x330/0x330 [ 490.863639][T13759] ? memcpy+0x56/0x70 [ 490.867818][T13759] btf_parse_hdr+0x388/0x7b0 [ 490.872427][T13759] btf_new_fd+0x4af/0xa00 [ 490.877224][T13759] bpf_btf_load+0x5e/0x70 [ 490.882104][T13759] __se_sys_bpf+0x48a/0x680 [ 490.886615][T13759] ? __x64_sys_bpf+0x90/0x90 [ 490.891347][T13759] ? fpu__clear_all+0x20/0x20 [ 490.896219][T13759] __x64_sys_bpf+0x7b/0x90 [ 490.900904][T13759] do_syscall_64+0x31/0x40 [ 490.905362][T13759] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 490.911262][T13759] RIP: 0033:0x7f88498ee929 [ 490.915723][T13759] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 490.937007][T13759] RSP: 002b:00007f8847f36038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 490.946271][T13759] RAX: ffffffffffffffda RBX: 00007f8849b16080 RCX: 00007f88498ee929 [ 490.954478][T13759] RDX: 0000000000000020 RSI: 00002000000001c0 RDI: 0000000000000012 [ 490.963040][T13759] RBP: 00007f8847f36090 R08: 0000000000000000 R09: 0000000000000000 [ 490.971565][T13759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 490.980119][T13759] R13: 0000000000000000 R14: 00007f8849b16080 R15: 00007fffb35dea58 [ 491.066950][T13771] FAULT_INJECTION: forcing a failure. [ 491.066950][T13771] name failslab, interval 1, probability 0, space 0, times 0 [ 491.081758][T13771] CPU: 0 PID: 13771 Comm: syz.0.4604 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 491.093335][T13771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 491.103930][T13771] Call Trace: [ 491.107466][T13771] __dump_stack+0x21/0x24 [ 491.111820][T13771] dump_stack_lvl+0x169/0x1d8 [ 491.116561][T13771] ? show_regs_print_info+0x18/0x18 [ 491.121763][T13771] dump_stack+0x15/0x1c [ 491.125918][T13771] should_fail+0x3c1/0x510 [ 491.130438][T13771] ? tracepoint_add_func+0x332/0x9f0 [ 491.135796][T13771] __should_failslab+0xa4/0xe0 [ 491.140645][T13771] should_failslab+0x9/0x20 [ 491.145494][T13771] __kmalloc+0x60/0x330 [ 491.149734][T13771] tracepoint_add_func+0x332/0x9f0 [ 491.154930][T13771] ? mutex_trylock+0xa0/0xa0 [ 491.159693][T13771] ? perf_trace_tlb_flush+0x340/0x340 [ 491.165281][T13771] ? perf_trace_tlb_flush+0x340/0x340 [ 491.170762][T13771] tracepoint_probe_register_prio_may_exist+0x5b/0x90 [ 491.177915][T13771] ? perf_trace_tlb_flush+0x340/0x340 [ 491.183316][T13771] bpf_probe_register+0x13f/0x1d0 [ 491.188468][T13771] bpf_raw_tracepoint_open+0x6a2/0x790 [ 491.193940][T13771] ? bpf_obj_get_info_by_fd+0x2c30/0x2c30 [ 491.199935][T13771] ? selinux_bpf+0xce/0xf0 [ 491.204626][T13771] ? security_bpf+0x82/0xa0 [ 491.209158][T13771] __se_sys_bpf+0x418/0x680 [ 491.213680][T13771] ? __x64_sys_bpf+0x90/0x90 [ 491.218287][T13771] ? fpu__clear_all+0x20/0x20 [ 491.223427][T13771] __x64_sys_bpf+0x7b/0x90 [ 491.228230][T13771] do_syscall_64+0x31/0x40 [ 491.232940][T13771] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 491.239475][T13771] RIP: 0033:0x7f07f6f37929 [ 491.244434][T13771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 491.266071][T13771] RSP: 002b:00007f07f55a0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 491.274769][T13771] RAX: ffffffffffffffda RBX: 00007f07f715efa0 RCX: 00007f07f6f37929 [ 491.282915][T13771] RDX: 0000000000000010 RSI: 0000200000000080 RDI: 0000000000000011 [ 491.290889][T13771] RBP: 00007f07f55a0090 R08: 0000000000000000 R09: 0000000000000000 [ 491.299929][T13771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 491.308486][T13771] R13: 0000000000000000 R14: 00007f07f715efa0 R15: 00007ffe4c70d2a8 [ 491.350878][T13778] device pim6reg1 entered promiscuous mode [ 491.405433][T13780] device macsec0 left promiscuous mode [ 491.413157][T13780] device veth1_macvtap entered promiscuous mode [ 491.419959][T13780] device macsec0 entered promiscuous mode [ 491.426942][T13780] FAULT_INJECTION: forcing a failure. [ 491.426942][T13780] name failslab, interval 1, probability 0, space 0, times 0 [ 491.441568][T13780] CPU: 0 PID: 13780 Comm: syz.0.4607 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 491.454633][T13780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 491.465251][T13780] Call Trace: [ 491.469084][T13780] __dump_stack+0x21/0x24 [ 491.473437][T13780] dump_stack_lvl+0x169/0x1d8 [ 491.478595][T13780] ? show_regs_print_info+0x18/0x18 [ 491.483884][T13780] dump_stack+0x15/0x1c [ 491.488127][T13780] should_fail+0x3c1/0x510 [ 491.492972][T13780] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 491.498647][T13780] __should_failslab+0xa4/0xe0 [ 491.503428][T13780] should_failslab+0x9/0x20 [ 491.508128][T13780] __kmalloc_track_caller+0x5f/0x320 [ 491.513574][T13780] ? kmem_cache_alloc+0x165/0x2e0 [ 491.518851][T13780] ? __alloc_skb+0x9e/0x520 [ 491.523354][T13780] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 491.529013][T13780] __alloc_skb+0xdc/0x520 [ 491.533659][T13780] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 491.539035][T13780] rtmsg_ifinfo+0x7a/0x130 [ 491.543541][T13780] __dev_notify_flags+0xdb/0x500 [ 491.548862][T13780] ? __dev_change_flags+0x6a0/0x6a0 [ 491.554136][T13780] ? __dev_change_flags+0x513/0x6a0 [ 491.559682][T13780] ? dev_get_flags+0x1e0/0x1e0 [ 491.564841][T13780] ? selinux_capable+0x29c/0x380 [ 491.570190][T13780] ? selinux_capset+0xf0/0xf0 [ 491.575062][T13780] dev_change_flags+0xe8/0x1a0 [ 491.580396][T13780] dev_ifsioc+0x113/0xa50 [ 491.585094][T13780] ? dev_ioctl+0xb80/0xb80 [ 491.590570][T13780] dev_ioctl+0x550/0xb80 [ 491.595759][T13780] sock_do_ioctl+0x235/0x330 [ 491.601094][T13780] ? __kasan_slab_free+0x11/0x20 [ 491.606807][T13780] ? sock_show_fdinfo+0xa0/0xa0 [ 491.612891][T13780] ? selinux_file_ioctl+0x377/0x480 [ 491.618645][T13780] ? mutex_trylock+0xa0/0xa0 [ 491.623527][T13780] ? __fget_files+0x2c4/0x320 [ 491.629109][T13780] sock_ioctl+0x504/0x710 [ 491.633905][T13780] ? sock_poll+0x360/0x360 [ 491.639307][T13780] ? __fget_files+0x2c4/0x320 [ 491.644309][T13780] ? security_file_ioctl+0x84/0xa0 [ 491.650091][T13780] ? sock_poll+0x360/0x360 [ 491.655038][T13780] __se_sys_ioctl+0x121/0x1a0 [ 491.659725][T13780] __x64_sys_ioctl+0x7b/0x90 [ 491.664471][T13780] do_syscall_64+0x31/0x40 [ 491.668907][T13780] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 491.675332][T13780] RIP: 0033:0x7f07f6f37929 [ 491.679770][T13780] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 491.700518][T13780] RSP: 002b:00007f07f55a0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 491.711116][T13780] RAX: ffffffffffffffda RBX: 00007f07f715efa0 RCX: 00007f07f6f37929 [ 491.720642][T13780] RDX: 0000200000000080 RSI: 0000000000008914 RDI: 0000000000000008 [ 491.729125][T13780] RBP: 00007f07f55a0090 R08: 0000000000000000 R09: 0000000000000000 [ 491.737387][T13780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 491.745541][T13780] R13: 0000000000000000 R14: 00007f07f715efa0 R15: 00007ffe4c70d2a8 [ 491.756169][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 492.314011][T13812] FAULT_INJECTION: forcing a failure. [ 492.314011][T13812] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 492.351770][T13812] CPU: 1 PID: 13812 Comm: syz.1.4619 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 492.363815][T13812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 492.374175][T13812] Call Trace: [ 492.377743][T13812] __dump_stack+0x21/0x24 [ 492.382310][T13812] dump_stack_lvl+0x169/0x1d8 [ 492.387521][T13812] ? show_regs_print_info+0x18/0x18 [ 492.393037][T13812] dump_stack+0x15/0x1c [ 492.397212][T13812] should_fail+0x3c1/0x510 [ 492.401885][T13812] should_fail_alloc_page+0x4f/0x60 [ 492.407105][T13812] __alloc_pages_nodemask+0x109/0x5f0 [ 492.412505][T13812] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 492.418075][T13812] ? __kmalloc_track_caller+0x1d7/0x320 [ 492.424108][T13812] ? kasan_unpoison+0x67/0x90 [ 492.429522][T13812] ? __kasan_check_write+0x14/0x20 [ 492.435675][T13812] ? __alloc_skb+0x38b/0x520 [ 492.440983][T13812] alloc_skb_with_frags+0x18c/0x560 [ 492.447477][T13812] sock_alloc_send_pskb+0x853/0x980 [ 492.453185][T13812] ? sock_kzfree_s+0x60/0x60 [ 492.458270][T13812] ? __kasan_check_write+0x14/0x20 [ 492.463666][T13812] ? _raw_spin_lock+0x8e/0xe0 [ 492.469068][T13812] ? _raw_spin_trylock_bh+0x130/0x130 [ 492.475196][T13812] ? security_socket_getpeersec_dgram+0x93/0xb0 [ 492.482537][T13812] unix_dgram_sendmsg+0x5f4/0x17d0 [ 492.487779][T13812] ? selinux_socket_accept+0x500/0x500 [ 492.493981][T13812] ? stack_trace_snprint+0xf0/0xf0 [ 492.499283][T13812] ? unix_dgram_poll+0x620/0x620 [ 492.504414][T13812] ? kasan_set_track+0x5b/0x70 [ 492.509182][T13812] ? kasan_set_track+0x4a/0x70 [ 492.514126][T13812] ? security_socket_sendmsg+0x82/0xa0 [ 492.519758][T13812] ? unix_dgram_poll+0x620/0x620 [ 492.524879][T13812] ____sys_sendmsg+0x5a2/0x8c0 [ 492.530341][T13812] ? __sys_sendmsg_sock+0x40/0x40 [ 492.535663][T13812] ? import_iovec+0x7c/0xb0 [ 492.540384][T13812] ___sys_sendmsg+0x1f0/0x260 [ 492.545170][T13812] ? __sys_sendmsg+0x250/0x250 [ 492.549992][T13812] ? rw_verify_area+0x1c0/0x360 [ 492.554865][T13812] ? __fdget+0x1a1/0x230 [ 492.559321][T13812] __x64_sys_sendmsg+0x1e2/0x2a0 [ 492.564281][T13812] ? fput+0x1a/0x20 [ 492.568196][T13812] ? ___sys_sendmsg+0x260/0x260 [ 492.573170][T13812] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 492.579425][T13812] do_syscall_64+0x31/0x40 [ 492.583885][T13812] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 492.592104][T13812] RIP: 0033:0x7f67f53e9929 [ 492.597478][T13812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 492.618355][T13812] RSP: 002b:00007f67f3a52038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 492.627665][T13812] RAX: ffffffffffffffda RBX: 00007f67f5610fa0 RCX: 00007f67f53e9929 [ 492.635902][T13812] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000006 [ 492.644058][T13812] RBP: 00007f67f3a52090 R08: 0000000000000000 R09: 0000000000000000 [ 492.652498][T13812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 492.661540][T13812] R13: 0000000000000000 R14: 00007f67f5610fa0 R15: 00007ffda6d6f088 [ 492.843627][T13816] device pim6reg1 entered promiscuous mode [ 493.544343][T13832] device pim6reg1 entered promiscuous mode [ 495.468284][T13872] device syzkaller0 entered promiscuous mode [ 495.841049][T13876] device pim6reg1 entered promiscuous mode [ 495.867801][T13878] FAULT_INJECTION: forcing a failure. [ 495.867801][T13878] name failslab, interval 1, probability 0, space 0, times 0 [ 495.953924][T13878] CPU: 0 PID: 13878 Comm: syz.0.4642 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 495.965349][T13878] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 495.976066][T13878] Call Trace: [ 495.979384][T13878] __dump_stack+0x21/0x24 [ 495.984426][T13878] dump_stack_lvl+0x169/0x1d8 [ 495.989365][T13878] ? thaw_kernel_threads+0x220/0x220 [ 495.994945][T13878] ? show_regs_print_info+0x18/0x18 [ 496.000408][T13878] ? kernel_write+0x3c0/0x3c0 [ 496.005523][T13878] dump_stack+0x15/0x1c [ 496.009787][T13878] should_fail+0x3c1/0x510 [ 496.014212][T13878] ? getname_flags+0xb9/0x500 [ 496.018973][T13878] __should_failslab+0xa4/0xe0 [ 496.023737][T13878] should_failslab+0x9/0x20 [ 496.028244][T13878] kmem_cache_alloc+0x3d/0x2e0 [ 496.033183][T13878] getname_flags+0xb9/0x500 [ 496.037783][T13878] do_mkdirat+0x4b/0x340 [ 496.042128][T13878] __x64_sys_mkdirat+0x7b/0x90 [ 496.047263][T13878] do_syscall_64+0x31/0x40 [ 496.051835][T13878] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 496.057905][T13878] RIP: 0033:0x7f07f6f37929 [ 496.062336][T13878] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 496.082148][T13878] RSP: 002b:00007f07f55a0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 496.091177][T13878] RAX: ffffffffffffffda RBX: 00007f07f715efa0 RCX: 00007f07f6f37929 [ 496.099730][T13878] RDX: 00000000000001ff RSI: 00002000000003c0 RDI: ffffffffffffffff [ 496.108140][T13878] RBP: 00007f07f55a0090 R08: 0000000000000000 R09: 0000000000000000 [ 496.116381][T13878] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 496.124556][T13878] R13: 0000000000000000 R14: 00007f07f715efa0 R15: 00007ffe4c70d2a8 [ 496.442120][T13905] device pim6reg1 entered promiscuous mode [ 496.472721][T13904] device wg2 entered promiscuous mode [ 496.615025][T13906] device veth0_vlan left promiscuous mode [ 496.631189][T13906] device veth0_vlan entered promiscuous mode [ 496.658415][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 496.668268][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 496.677352][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 498.241498][T13983] device pim6reg1 entered promiscuous mode [ 498.441927][T13993] device syzkaller0 entered promiscuous mode [ 499.275519][T14039] device sit0 left promiscuous mode [ 499.330110][T14039] device sit0 entered promiscuous mode [ 499.506985][T14052] device pim6reg1 entered promiscuous mode [ 499.527991][T14055] device pim6reg1 entered promiscuous mode [ 499.542714][T14057] device pim6reg1 entered promiscuous mode [ 500.435609][T14085] device pim6reg1 entered promiscuous mode [ 500.447110][T14088] device pim6reg1 entered promiscuous mode [ 500.540600][ T24] audit: type=1400 audit(1750200548.680:155): avc: denied { attach_queue } for pid=14098 comm="syz.3.4730" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 500.643469][T14109] FAULT_INJECTION: forcing a failure. [ 500.643469][T14109] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 500.661489][T14109] CPU: 0 PID: 14109 Comm: syz.1.4734 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 500.673124][T14109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 500.683290][T14109] Call Trace: [ 500.686694][T14109] __dump_stack+0x21/0x24 [ 500.691332][T14109] dump_stack_lvl+0x169/0x1d8 [ 500.696219][T14109] ? show_regs_print_info+0x18/0x18 [ 500.701432][T14109] ? irq_exit_rcu+0x9/0x10 [ 500.705857][T14109] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 500.711670][T14109] dump_stack+0x15/0x1c [ 500.716037][T14109] should_fail+0x3c1/0x510 [ 500.720897][T14109] should_fail_usercopy+0x1a/0x20 [ 500.726576][T14109] copy_fpstate_to_sigframe+0x86b/0xb40 [ 500.732122][T14109] ? fpregs_set+0x540/0x540 [ 500.736625][T14109] ? _raw_spin_unlock_irq+0x4e/0x70 [ 500.741816][T14109] ? get_signal+0x1238/0x12e0 [ 500.746579][T14109] ? fpu__alloc_mathframe+0x88/0x150 [ 500.752034][T14109] arch_do_signal_or_restart+0x5c7/0x10f0 [ 500.757753][T14109] ? kvm_sched_clock_read+0x18/0x40 [ 500.762947][T14109] ? sched_clock+0x3a/0x40 [ 500.767470][T14109] ? sched_clock_cpu+0x1b/0x3d0 [ 500.772339][T14109] ? sched_clock+0x3a/0x40 [ 500.776755][T14109] ? __ia32_sys_rt_sigreturn+0x6c0/0x6c0 [ 500.782664][T14109] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 500.788904][T14109] exit_to_user_mode_loop+0xa2/0xe0 [ 500.794611][T14109] irqentry_exit_to_user_mode+0x4e/0x80 [ 500.800172][T14109] irqentry_exit+0x12/0x60 [ 500.804589][T14109] exc_general_protection+0x1ca/0x250 [ 500.810179][T14109] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 500.816862][T14109] ? irqentry_exit+0x12/0x60 [ 500.821623][T14109] ? asm_exc_general_protection+0x8/0x30 [ 500.827348][T14109] asm_exc_general_protection+0x1e/0x30 [ 500.832889][T14109] RIP: 0033:0x7f67f53c2479 [ 500.837669][T14109] Code: f8 77 c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 89 f8 48 89 fa c5 f9 ef c0 25 ff 0f 00 00 3d e0 0f 00 00 0f 87 27 01 00 00 fd 74 0f c5 fd d7 c1 85 c0 74 5b f3 0f bc c0 e9 30 01 00 00 66 [ 500.858470][T14109] RSP: 002b:00007f67f3a517c8 EFLAGS: 00010283 [ 500.864640][T14109] RAX: 0000000000000999 RBX: 00007f67f3a51d30 RCX: 00007f67f55d0120 [ 500.873004][T14109] RDX: 9999999999999999 RSI: 00007f67f546b83c RDI: 9999999999999999 [ 500.881427][T14109] RBP: 000000000000000b R08: 0000000000000000 R09: 0000000000000000 [ 500.889514][T14109] R10: 00000000ffffffff R11: 0000000000000000 R12: 0000000000000073 [ 500.897755][T14109] R13: 00007f67f3a51eb0 R14: 9999999999999999 R15: 0000000000000000 [ 501.919626][T14136] device pim6reg1 entered promiscuous mode [ 502.729118][T14157] device pim6reg1 entered promiscuous mode [ 503.910796][T14181] device pim6reg1 entered promiscuous mode [ 503.954702][T14186] FAULT_INJECTION: forcing a failure. [ 503.954702][T14186] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 504.012693][T14186] CPU: 1 PID: 14186 Comm: syz.1.4759 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 504.024105][T14186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 504.034261][T14186] Call Trace: [ 504.037572][T14186] __dump_stack+0x21/0x24 [ 504.041910][T14186] dump_stack_lvl+0x169/0x1d8 [ 504.046584][T14186] ? show_regs_print_info+0x18/0x18 [ 504.051798][T14186] dump_stack+0x15/0x1c [ 504.055948][T14186] should_fail+0x3c1/0x510 [ 504.060352][T14186] should_fail_usercopy+0x1a/0x20 [ 504.065449][T14186] _copy_from_user+0x20/0xd0 [ 504.070033][T14186] iovec_from_user+0x1bc/0x2f0 [ 504.074965][T14186] ? __copy_msghdr_from_user+0x302/0x5e0 [ 504.080591][T14186] __import_iovec+0x71/0x390 [ 504.085199][T14186] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 504.090566][T14186] import_iovec+0x7c/0xb0 [ 504.095234][T14186] ___sys_sendmsg+0x1b9/0x260 [ 504.100437][T14186] ? __sys_sendmsg+0x250/0x250 [ 504.105596][T14186] ? rw_verify_area+0x1c0/0x360 [ 504.110476][T14186] ? __fdget+0x1a1/0x230 [ 504.114852][T14186] __x64_sys_sendmsg+0x1e2/0x2a0 [ 504.119793][T14186] ? fput+0x1a/0x20 [ 504.123595][T14186] ? ___sys_sendmsg+0x260/0x260 [ 504.128615][T14186] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 504.134782][T14186] do_syscall_64+0x31/0x40 [ 504.139200][T14186] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 504.145218][T14186] RIP: 0033:0x7f67f53e9929 [ 504.149752][T14186] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 504.169633][T14186] RSP: 002b:00007f67f3a52038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 504.178092][T14186] RAX: ffffffffffffffda RBX: 00007f67f5610fa0 RCX: 00007f67f53e9929 [ 504.186239][T14186] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000006 [ 504.194209][T14186] RBP: 00007f67f3a52090 R08: 0000000000000000 R09: 0000000000000000 [ 504.202272][T14186] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 504.210265][T14186] R13: 0000000000000000 R14: 00007f67f5610fa0 R15: 00007ffda6d6f088 [ 505.230430][T14216] device pim6reg1 entered promiscuous mode [ 505.554901][T14228] device pim6reg1 entered promiscuous mode [ 505.698901][T14236] FAULT_INJECTION: forcing a failure. [ 505.698901][T14236] name failslab, interval 1, probability 0, space 0, times 0 [ 505.711897][T14236] CPU: 0 PID: 14236 Comm: syz.4.4782 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 505.723372][T14236] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 505.733526][T14236] Call Trace: [ 505.736938][T14236] __dump_stack+0x21/0x24 [ 505.741293][T14236] dump_stack_lvl+0x169/0x1d8 [ 505.746148][T14236] ? thaw_kernel_threads+0x220/0x220 [ 505.751436][T14236] ? show_regs_print_info+0x18/0x18 [ 505.756652][T14236] dump_stack+0x15/0x1c [ 505.760832][T14236] should_fail+0x3c1/0x510 [ 505.765272][T14236] ? inet6_rt_notify+0x287/0x470 [ 505.770212][T14236] __should_failslab+0xa4/0xe0 [ 505.775067][T14236] should_failslab+0x9/0x20 [ 505.779666][T14236] __kmalloc_track_caller+0x5f/0x320 [ 505.785457][T14236] ? kmem_cache_alloc+0x165/0x2e0 [ 505.790518][T14236] ? __alloc_skb+0x9e/0x520 [ 505.795068][T14236] ? inet6_rt_notify+0x287/0x470 [ 505.800238][T14236] __alloc_skb+0xdc/0x520 [ 505.804767][T14236] inet6_rt_notify+0x287/0x470 [ 505.810457][T14236] ? rt6_nh_dump_exceptions+0x690/0x690 [ 505.816024][T14236] fib6_del+0xbf9/0xf60 [ 505.820199][T14236] ? fib6_locate+0x460/0x460 [ 505.824911][T14236] ? update_load_avg+0x4dc/0x14f0 [ 505.830386][T14236] ? fib6_ifdown+0x2eb/0x4e0 [ 505.835076][T14236] fib6_clean_node+0x296/0x520 [ 505.839831][T14236] ? node_free_rcu+0x30/0x30 [ 505.844435][T14236] fib6_walk_continue+0x4fc/0x700 [ 505.849539][T14236] fib6_walk+0x153/0x290 [ 505.853860][T14236] fib6_clean_all+0x16a/0x230 [ 505.858679][T14236] ? tracing_record_taskinfo+0x7c/0x220 [ 505.864476][T14236] ? rt6_sync_down_dev+0x130/0x130 [ 505.869675][T14236] ? fib6_del+0xf60/0xf60 [ 505.874081][T14236] ? node_free_rcu+0x30/0x30 [ 505.878751][T14236] ? rt6_sync_down_dev+0x130/0x130 [ 505.883853][T14236] ? schedule_preempt_disabled+0x20/0x20 [ 505.889565][T14236] rt6_disable_ip+0x119/0x6a0 [ 505.894594][T14236] ? preempt_schedule_thunk+0x16/0x18 [ 505.899959][T14236] ? __queue_work+0x951/0xca0 [ 505.904714][T14236] ? fib6_ifdown+0x4e0/0x4e0 [ 505.909386][T14236] ? __kasan_check_read+0x11/0x20 [ 505.914583][T14236] addrconf_ifdown+0x144/0x1800 [ 505.919423][T14236] ? addrconf_cleanup+0x1c0/0x1c0 [ 505.924440][T14236] ? __kasan_check_write+0x14/0x20 [ 505.929743][T14236] ? mutex_lock+0x8c/0xe0 [ 505.934422][T14236] ? mutex_trylock+0xa0/0xa0 [ 505.939001][T14236] ? nf_nat_masq_schedule+0x490/0x490 [ 505.944365][T14236] ? __kasan_check_write+0x14/0x20 [ 505.949482][T14236] addrconf_notify+0x3bd/0xe90 [ 505.954242][T14236] raw_notifier_call_chain+0x90/0x100 [ 505.959695][T14236] dev_close_many+0x330/0x4d0 [ 505.964363][T14236] ? __dev_open+0x4c0/0x4c0 [ 505.969255][T14236] ? __kasan_check_read+0x11/0x20 [ 505.974275][T14236] unregister_netdevice_many+0x44c/0x1980 [ 505.980102][T14236] ? __mod_timer+0x7ae/0xb30 [ 505.984684][T14236] ? ____kasan_slab_free+0x130/0x160 [ 505.990137][T14236] ? alloc_netdev_mqs+0xc80/0xc80 [ 505.995331][T14236] ? add_timer+0x68/0x80 [ 505.999837][T14236] ? __queue_delayed_work+0x173/0x200 [ 506.005285][T14236] ? __kasan_check_read+0x11/0x20 [ 506.010520][T14236] unregister_netdevice_queue+0x31c/0x360 [ 506.016357][T14236] ? linkwatch_urgent_event+0x3a0/0x4a0 [ 506.022038][T14236] ? list_netdevice+0x4c0/0x4c0 [ 506.027006][T14236] ? linkwatch_fire_event+0x2d3/0x330 [ 506.032386][T14236] __tun_detach+0xca6/0x1450 [ 506.037012][T14236] ? tun_chr_open+0x540/0x540 [ 506.041687][T14236] tun_chr_close+0x92/0x140 [ 506.046297][T14236] __fput+0x2fb/0x770 [ 506.050274][T14236] ____fput+0x15/0x20 [ 506.054253][T14236] task_work_run+0x127/0x190 [ 506.058944][T14236] exit_to_user_mode_loop+0xcb/0xe0 [ 506.064409][T14236] syscall_exit_to_user_mode+0x68/0x90 [ 506.069863][T14236] do_syscall_64+0x3d/0x40 [ 506.074278][T14236] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 506.080164][T14236] RIP: 0033:0x7fb45f448929 [ 506.084615][T14236] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 506.104404][T14236] RSP: 002b:00007fb45dab1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 506.112912][T14236] RAX: 0000000000000000 RBX: 00007fb45f66ffa0 RCX: 00007fb45f448929 [ 506.121245][T14236] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000004 [ 506.129210][T14236] RBP: 00007fb45dab1090 R08: 0000000000000000 R09: 0000000000000000 [ 506.137349][T14236] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 506.145575][T14236] R13: 0000000000000000 R14: 00007fb45f66ffa0 R15: 00007ffff13a9158 [ 506.294309][T14246] device pim6reg1 entered promiscuous mode [ 506.494428][T14264] device pim6reg1 entered promiscuous mode [ 506.695565][T14269] device veth0_vlan left promiscuous mode [ 506.717966][T14269] device veth0_vlan entered promiscuous mode [ 506.741799][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 506.759134][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 506.794026][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 506.910313][T14281] @0Ù: renamed from bond_slave_1 [ 507.123694][T14297] device pim6reg1 entered promiscuous mode [ 507.251663][T14302] device pim6reg1 entered promiscuous mode [ 507.432351][T14306] device veth0_vlan left promiscuous mode [ 507.457490][T14306] device veth0_vlan entered promiscuous mode [ 507.526504][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 507.555206][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 507.588905][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 507.626595][T14320] @0Ù: renamed from bond_slave_1 [ 508.015895][T14332] device pim6reg1 entered promiscuous mode [ 508.248137][T14339] device veth0_vlan left promiscuous mode [ 508.337429][T14339] device veth0_vlan entered promiscuous mode [ 508.428406][T14349] device pim6reg1 entered promiscuous mode [ 508.481551][T14354] device syzkaller0 entered promiscuous mode [ 509.014626][T14382] device pim6reg1 entered promiscuous mode [ 509.178324][T14389] device syzkaller0 entered promiscuous mode [ 509.679375][T14402] device wg2 entered promiscuous mode [ 510.117885][T14420] device pim6reg1 entered promiscuous mode [ 510.191109][T14424] device pim6reg1 entered promiscuous mode [ 510.898381][T14442] ÿ: renamed from bond_slave_0 [ 511.473255][T14461] device pim6reg1 entered promiscuous mode [ 512.686272][T14491] FAULT_INJECTION: forcing a failure. [ 512.686272][T14491] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 512.701649][T14491] CPU: 1 PID: 14491 Comm: syz.3.4876 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 512.713958][T14491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 512.724156][T14491] Call Trace: [ 512.727503][T14491] __dump_stack+0x21/0x24 [ 512.732028][T14491] dump_stack_lvl+0x169/0x1d8 [ 512.736843][T14491] ? thaw_kernel_threads+0x220/0x220 [ 512.742633][T14491] ? show_regs_print_info+0x18/0x18 [ 512.747952][T14491] dump_stack+0x15/0x1c [ 512.752292][T14491] should_fail+0x3c1/0x510 [ 512.756823][T14491] should_fail_usercopy+0x1a/0x20 [ 512.761854][T14491] _copy_to_user+0x20/0x90 [ 512.766557][T14491] bpf_verifier_vlog+0x1b4/0x330 [ 512.771508][T14491] btf_verifier_log+0x1dc/0x2a0 [ 512.776656][T14491] ? btf_id_cmp_func+0x80/0x80 [ 512.781446][T14491] ? btf_check_sec_info+0x330/0x330 [ 512.787513][T14491] btf_array_log+0x76/0xe0 [ 512.792197][T14491] __btf_verifier_log_type+0x3f9/0x610 [ 512.797782][T14491] ? btf_sec_info_cmp+0x5f/0x110 [ 512.802731][T14491] ? btf_int_show+0x2bf0/0x2bf0 [ 512.807768][T14491] ? sort_r+0xe04/0xe20 [ 512.812213][T14491] btf_array_check_meta+0x1e5/0x2c0 [ 512.817802][T14491] btf_check_all_metas+0x230/0x820 [ 512.823030][T14491] ? __btf_verifier_log+0x120/0x120 [ 512.828271][T14491] btf_parse_type_sec+0xea/0x15a0 [ 512.833297][T14491] ? btf_check_sec_info+0x27a/0x330 [ 512.838586][T14491] ? btf_check_sec_info+0x330/0x330 [ 512.843812][T14491] ? btf_verifier_log+0x2a0/0x2a0 [ 512.848999][T14491] ? memcpy+0x56/0x70 [ 512.853295][T14491] ? btf_parse_hdr+0x5d6/0x7b0 [ 512.858643][T14491] ? btf_parse_str_sec+0x1aa/0x260 [ 512.863853][T14491] btf_new_fd+0x562/0xa00 [ 512.868198][T14491] bpf_btf_load+0x5e/0x70 [ 512.872538][T14491] __se_sys_bpf+0x48a/0x680 [ 512.877230][T14491] ? __x64_sys_bpf+0x90/0x90 [ 512.881837][T14491] __x64_sys_bpf+0x7b/0x90 [ 512.886551][T14491] do_syscall_64+0x31/0x40 [ 512.891367][T14491] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 512.898308][T14491] RIP: 0033:0x7f321ddd2929 [ 512.903110][T14491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 512.922988][T14491] RSP: 002b:00007f321c43b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 512.931516][T14491] RAX: ffffffffffffffda RBX: 00007f321dff9fa0 RCX: 00007f321ddd2929 [ 512.939672][T14491] RDX: 0000000000000028 RSI: 0000200000000280 RDI: 0000000000000012 [ 512.947728][T14491] RBP: 00007f321c43b090 R08: 0000000000000000 R09: 0000000000000000 [ 512.955788][T14491] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 512.963845][T14491] R13: 0000000000000001 R14: 00007f321dff9fa0 R15: 00007ffed3537c18 [ 513.114965][T14507] device pim6reg1 entered promiscuous mode [ 513.263406][T14513] device pim6reg1 entered promiscuous mode [ 513.297778][T14515] FAULT_INJECTION: forcing a failure. [ 513.297778][T14515] name failslab, interval 1, probability 0, space 0, times 0 [ 513.365911][T14515] CPU: 0 PID: 14515 Comm: syz.3.4885 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 513.377512][T14515] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 513.388284][T14515] Call Trace: [ 513.391601][T14515] __dump_stack+0x21/0x24 [ 513.395942][T14515] dump_stack_lvl+0x169/0x1d8 [ 513.400893][T14515] ? thaw_kernel_threads+0x220/0x220 [ 513.406192][T14515] ? show_regs_print_info+0x18/0x18 [ 513.411921][T14515] ? stack_trace_save+0x98/0xe0 [ 513.416895][T14515] ? stack_trace_snprint+0xf0/0xf0 [ 513.422017][T14515] dump_stack+0x15/0x1c [ 513.426191][T14515] should_fail+0x3c1/0x510 [ 513.430667][T14515] ? dup_task_struct+0x57/0xbd0 [ 513.435540][T14515] __should_failslab+0xa4/0xe0 [ 513.440570][T14515] should_failslab+0x9/0x20 [ 513.445369][T14515] kmem_cache_alloc+0x3d/0x2e0 [ 513.450227][T14515] ? __kasan_check_write+0x14/0x20 [ 513.455355][T14515] dup_task_struct+0x57/0xbd0 [ 513.460249][T14515] ? __kasan_check_write+0x14/0x20 [ 513.465852][T14515] ? recalc_sigpending+0x1ac/0x230 [ 513.471517][T14515] copy_process+0x5b2/0x32c0 [ 513.476304][T14515] ? memset+0x35/0x40 [ 513.480480][T14515] ? proc_fail_nth_read+0x210/0x210 [ 513.485685][T14515] ? __pidfd_prepare+0x150/0x150 [ 513.490664][T14515] ? rw_verify_area+0x1c0/0x360 [ 513.495647][T14515] ? vfs_write+0xac8/0xd60 [ 513.500078][T14515] kernel_clone+0x23f/0x940 [ 513.504592][T14515] ? kernel_write+0x3c0/0x3c0 [ 513.509364][T14515] ? create_io_thread+0x130/0x130 [ 513.514499][T14515] ? mutex_lock+0x8c/0xe0 [ 513.518844][T14515] __x64_sys_clone+0x176/0x1d0 [ 513.523734][T14515] ? __ia32_sys_vfork+0xf0/0xf0 [ 513.528858][T14515] ? ksys_write+0x1eb/0x240 [ 513.533380][T14515] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 513.539628][T14515] do_syscall_64+0x31/0x40 [ 513.544076][T14515] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 513.549987][T14515] RIP: 0033:0x7f321ddd2929 [ 513.554429][T14515] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 513.574243][T14515] RSP: 002b:00007f321c43afe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 513.583227][T14515] RAX: ffffffffffffffda RBX: 00007f321dff9fa0 RCX: 00007f321ddd2929 [ 513.591681][T14515] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000a49a4400 [ 513.600041][T14515] RBP: 00007f321c43b090 R08: ffffffffff600000 R09: ffffffffff600000 [ 513.608122][T14515] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 513.616195][T14515] R13: 0000000000000000 R14: 00007f321dff9fa0 R15: 00007ffed3537c18 [ 513.802463][T14539] device pim6reg1 entered promiscuous mode [ 513.968179][T14535] syzkaller0: tun_chr_ioctl cmd 1074025673 [ 513.988922][T14534] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 513.998355][T14534] syzkaller0: linktype set to 776 [ 514.006731][T14552] device pim6reg1 entered promiscuous mode [ 514.526587][T14577] device pim6reg1 entered promiscuous mode [ 514.684078][T14582] device pim6reg1 entered promiscuous mode [ 514.739665][T14581] device pim6reg1 entered promiscuous mode [ 515.146604][T14602] syz.0.4920[14602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 515.148086][T14602] syz.0.4920[14602] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 515.206413][T14606] device pim6reg1 entered promiscuous mode [ 515.299711][T14609] syz.3.4923[14609] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 515.299786][T14609] syz.3.4923[14609] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 515.348604][T14612] device pim6reg1 entered promiscuous mode [ 515.410935][T14609] device syzkaller0 entered promiscuous mode [ 515.478950][T14617] device pim6reg1 entered promiscuous mode [ 516.166518][T14647] device pim6reg1 entered promiscuous mode [ 516.197104][T14649] device pim6reg1 entered promiscuous mode [ 516.314303][T14653] device pim6reg1 entered promiscuous mode [ 516.772405][T14674] device pim6reg1 entered promiscuous mode [ 516.909395][T14678] device pim6reg1 entered promiscuous mode [ 516.975406][T14683] FAULT_INJECTION: forcing a failure. [ 516.975406][T14683] name failslab, interval 1, probability 0, space 0, times 0 [ 517.030107][T14685] device pim6reg1 entered promiscuous mode [ 517.046303][T14683] CPU: 1 PID: 14683 Comm: syz.0.4952 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 517.057997][T14683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 517.068138][T14683] Call Trace: [ 517.071446][T14683] __dump_stack+0x21/0x24 [ 517.075987][T14683] dump_stack_lvl+0x169/0x1d8 [ 517.081000][T14683] ? show_regs_print_info+0x18/0x18 [ 517.086292][T14683] ? terminate_walk+0x3fe/0x4e0 [ 517.091182][T14683] dump_stack+0x15/0x1c [ 517.095851][T14683] should_fail+0x3c1/0x510 [ 517.100470][T14683] ? __d_alloc+0x2d/0x6a0 [ 517.104818][T14683] __should_failslab+0xa4/0xe0 [ 517.109600][T14683] should_failslab+0x9/0x20 [ 517.114153][T14683] kmem_cache_alloc+0x3d/0x2e0 [ 517.118939][T14683] __d_alloc+0x2d/0x6a0 [ 517.123164][T14683] d_alloc+0x4b/0x1d0 [ 517.127242][T14683] __lookup_hash+0xcb/0x250 [ 517.131759][T14683] filename_create+0x1d4/0x680 [ 517.136530][T14683] ? kern_path_create+0x40/0x40 [ 517.141390][T14683] ? getname_flags+0x206/0x500 [ 517.146264][T14683] do_mkdirat+0x5e/0x340 [ 517.150509][T14683] __x64_sys_mkdir+0x60/0x70 [ 517.155118][T14683] do_syscall_64+0x31/0x40 [ 517.159814][T14683] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 517.166289][T14683] RIP: 0033:0x7f07f6f37929 [ 517.170717][T14683] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 517.190508][T14683] RSP: 002b:00007f07f55a0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 517.199059][T14683] RAX: ffffffffffffffda RBX: 00007f07f715efa0 RCX: 00007f07f6f37929 [ 517.207130][T14683] RDX: 0000000000000000 RSI: 00000000000000aa RDI: 0000200000000580 [ 517.215132][T14683] RBP: 00007f07f55a0090 R08: 0000000000000000 R09: 0000000000000000 [ 517.223472][T14683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 517.231715][T14683] R13: 0000000000000000 R14: 00007f07f715efa0 R15: 00007ffe4c70d2a8 [ 517.565728][T14707] device pim6reg1 entered promiscuous mode [ 517.605696][T14714] device pim6reg1 entered promiscuous mode [ 517.659034][T14718] device pim6reg1 entered promiscuous mode [ 517.900865][T14733] FAULT_INJECTION: forcing a failure. [ 517.900865][T14733] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 517.918273][T14733] CPU: 0 PID: 14733 Comm: syz.1.4972 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 517.930453][T14733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 517.940709][T14733] Call Trace: [ 517.944026][T14733] __dump_stack+0x21/0x24 [ 517.948369][T14733] dump_stack_lvl+0x169/0x1d8 [ 517.953147][T14733] ? show_regs_print_info+0x18/0x18 [ 517.958359][T14733] dump_stack+0x15/0x1c [ 517.962615][T14733] should_fail+0x3c1/0x510 [ 517.967133][T14733] should_fail_alloc_page+0x4f/0x60 [ 517.972428][T14733] __alloc_pages_nodemask+0x109/0x5f0 [ 517.977812][T14733] ? sched_clock+0x3a/0x40 [ 517.982235][T14733] ? sched_clock_cpu+0x1b/0x3d0 [ 517.987094][T14733] ? sched_clock+0x3a/0x40 [ 517.991712][T14733] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 517.997388][T14733] ? debug_smp_processor_id+0x17/0x20 [ 518.002777][T14733] ? __irq_exit_rcu+0x40/0x150 [ 518.007564][T14733] ? find_next_bit+0x80/0x100 [ 518.012256][T14733] pcpu_populate_chunk+0x184/0xca0 [ 518.017394][T14733] pcpu_alloc+0xb4c/0x16b0 [ 518.022133][T14733] __alloc_percpu_gfp+0x25/0x30 [ 518.027152][T14733] array_map_alloc+0x440/0x7c0 [ 518.031937][T14733] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 518.037584][T14733] ? array_map_alloc_check+0x2c2/0x390 [ 518.043056][T14733] map_create+0x441/0x2190 [ 518.047491][T14733] __se_sys_bpf+0x203/0x680 [ 518.052124][T14733] ? __x64_sys_bpf+0x90/0x90 [ 518.056926][T14733] __x64_sys_bpf+0x7b/0x90 [ 518.061460][T14733] do_syscall_64+0x31/0x40 [ 518.065916][T14733] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 518.072258][T14733] RIP: 0033:0x7f67f53e9929 [ 518.076803][T14733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 518.096628][T14733] RSP: 002b:00007f67f3a52038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 518.105342][T14733] RAX: ffffffffffffffda RBX: 00007f67f5610fa0 RCX: 00007f67f53e9929 [ 518.113441][T14733] RDX: 0000000000000048 RSI: 0000200000000140 RDI: 2000000000000000 [ 518.121859][T14733] RBP: 00007f67f3a52090 R08: 0000000000000000 R09: 0000000000000000 [ 518.130198][T14733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 518.138906][T14733] R13: 0000000000000000 R14: 00007f67f5610fa0 R15: 00007ffda6d6f088 [ 518.258767][T14741] device pim6reg1 entered promiscuous mode [ 518.425376][T14744] device pim6reg1 entered promiscuous mode [ 518.474452][T14746] device pim6reg1 entered promiscuous mode [ 518.710404][T14756] FAULT_INJECTION: forcing a failure. [ 518.710404][T14756] name failslab, interval 1, probability 0, space 0, times 0 [ 518.723594][T14756] CPU: 1 PID: 14756 Comm: syz.1.4983 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 518.735072][T14756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 518.745358][T14756] Call Trace: [ 518.748676][T14756] __dump_stack+0x21/0x24 [ 518.753131][T14756] dump_stack_lvl+0x169/0x1d8 [ 518.757978][T14756] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 518.764247][T14756] ? show_regs_print_info+0x18/0x18 [ 518.769479][T14756] ? dump_stack+0x9/0x1c [ 518.773802][T14756] dump_stack+0x15/0x1c [ 518.777969][T14756] should_fail+0x3c1/0x510 [ 518.782458][T14756] ? radix_tree_node_alloc+0x80/0x380 [ 518.787820][T14756] __should_failslab+0xa4/0xe0 [ 518.792917][T14756] should_failslab+0x9/0x20 [ 518.797591][T14756] kmem_cache_alloc+0x3d/0x2e0 [ 518.802499][T14756] ? debug_smp_processor_id+0x17/0x20 [ 518.807871][T14756] radix_tree_node_alloc+0x80/0x380 [ 518.813065][T14756] ? irq_exit_rcu+0x9/0x10 [ 518.817744][T14756] idr_get_free+0x285/0x8f0 [ 518.822245][T14756] idr_alloc_cyclic+0x196/0x530 [ 518.827282][T14756] ? idr_alloc+0x2a0/0x2a0 [ 518.831821][T14756] ? __kasan_check_write+0x14/0x20 [ 518.837019][T14756] ? _raw_spin_lock_bh+0x8e/0xe0 [ 518.842109][T14756] ? debug_smp_processor_id+0x17/0x20 [ 518.847494][T14756] bpf_map_alloc_id+0x44/0x140 [ 518.852343][T14756] map_create+0x1386/0x2190 [ 518.857019][T14756] __se_sys_bpf+0x203/0x680 [ 518.861594][T14756] ? __x64_sys_bpf+0x90/0x90 [ 518.866174][T14756] ? debug_smp_processor_id+0x17/0x20 [ 518.871706][T14756] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 518.877754][T14756] __x64_sys_bpf+0x7b/0x90 [ 518.882494][T14756] do_syscall_64+0x31/0x40 [ 518.887253][T14756] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 518.893318][T14756] RIP: 0033:0x7f67f53e9929 [ 518.897990][T14756] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 518.917951][T14756] RSP: 002b:00007f67f3a52038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 518.926831][T14756] RAX: ffffffffffffffda RBX: 00007f67f5610fa0 RCX: 00007f67f53e9929 [ 518.935211][T14756] RDX: 0000000000000048 RSI: 0000200000000140 RDI: 2000000000000000 [ 518.943267][T14756] RBP: 00007f67f3a52090 R08: 0000000000000000 R09: 0000000000000000 [ 518.951910][T14756] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 518.959879][T14756] R13: 0000000000000000 R14: 00007f67f5610fa0 R15: 00007ffda6d6f088 [ 519.032312][T14772] device pim6reg1 entered promiscuous mode [ 519.068244][T14776] device pim6reg1 entered promiscuous mode [ 519.288759][T14800] device pim6reg1 entered promiscuous mode [ 520.117767][T14817] device pim6reg1 entered promiscuous mode [ 520.147664][T14821] device pim6reg1 entered promiscuous mode [ 520.237206][T14827] FAULT_INJECTION: forcing a failure. [ 520.237206][T14827] name failslab, interval 1, probability 0, space 0, times 0 [ 520.250587][T14827] CPU: 1 PID: 14827 Comm: syz.1.5009 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 520.262283][T14827] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 520.272365][T14827] Call Trace: [ 520.275765][T14827] __dump_stack+0x21/0x24 [ 520.280258][T14827] dump_stack_lvl+0x169/0x1d8 [ 520.285139][T14827] ? thaw_kernel_threads+0x220/0x220 [ 520.290537][T14827] ? show_regs_print_info+0x18/0x18 [ 520.295891][T14827] ? fib6_table_lookup+0x8a9/0x9f0 [ 520.301199][T14827] dump_stack+0x15/0x1c [ 520.305364][T14827] should_fail+0x3c1/0x510 [ 520.309886][T14827] ? dst_alloc+0x176/0x4f0 [ 520.314453][T14827] __should_failslab+0xa4/0xe0 [ 520.319222][T14827] should_failslab+0x9/0x20 [ 520.323740][T14827] kmem_cache_alloc+0x3d/0x2e0 [ 520.328507][T14827] dst_alloc+0x176/0x4f0 [ 520.332754][T14827] ip6_pol_route+0x960/0x1110 [ 520.337444][T14827] ? fib6_table_lookup+0x9f0/0x9f0 [ 520.342555][T14827] ? __kasan_check_write+0x14/0x20 [ 520.347688][T14827] ? prep_compound_page+0x253/0x330 [ 520.352984][T14827] ? __kasan_check_write+0x14/0x20 [ 520.358424][T14827] ? _raw_spin_lock+0x8e/0xe0 [ 520.363191][T14827] ip6_pol_route_input+0x56/0x80 [ 520.368134][T14827] fib6_rule_lookup+0x1c6/0x560 [ 520.372987][T14827] ? ip6_route_input_lookup+0xd0/0xd0 [ 520.378369][T14827] ? fib6_lookup+0x2a0/0x2a0 [ 520.382973][T14827] ? ip6t_do_table+0x1348/0x14e0 [ 520.388001][T14827] ip6_route_input+0x58b/0x780 [ 520.393034][T14827] ? ip6_multipath_l3_keys+0x5f0/0x5f0 [ 520.398529][T14827] ? ip6table_raw_hook+0x6a/0x80 [ 520.403599][T14827] ? ip6table_mangle_net_exit+0x80/0x80 [ 520.409172][T14827] ip6_rcv_finish+0x155/0x360 [ 520.413868][T14827] ipv6_rcv+0xec/0x210 [ 520.417946][T14827] ? ip6_rcv_finish+0x360/0x360 [ 520.422803][T14827] ? refcount_add+0x80/0x80 [ 520.427399][T14827] ? ip6_rcv_finish+0x360/0x360 [ 520.432341][T14827] __netif_receive_skb+0xc8/0x280 [ 520.437367][T14827] ? asm_exc_page_fault+0x1e/0x30 [ 520.442399][T14827] netif_receive_skb+0x9b/0x3d0 [ 520.447270][T14827] ? netif_receive_skb_core+0x100/0x100 [ 520.452986][T14827] ? virtio_net_hdr_to_skb+0x6d1/0x10c0 [ 520.458544][T14827] tun_rx_batched+0x5e8/0x710 [ 520.463228][T14827] ? local_bh_enable+0x30/0x30 [ 520.467989][T14827] tun_get_user+0x25d0/0x3090 [ 520.472663][T14827] ? __x64_sys_openat+0x136/0x160 [ 520.477683][T14827] ? tun_do_read+0x1c00/0x1c00 [ 520.482535][T14827] ? kstrtouint_from_user+0x1a0/0x200 [ 520.487905][T14827] ? __fsnotify_parent+0x5f5/0x6c0 [ 520.493016][T14827] ? avc_policy_seqno+0x1b/0x70 [ 520.497867][T14827] ? selinux_file_permission+0x2a5/0x510 [ 520.503493][T14827] ? fsnotify_perm+0x66/0x4b0 [ 520.508177][T14827] tun_chr_write_iter+0x1bf/0x270 [ 520.513204][T14827] vfs_write+0x725/0xd60 [ 520.517549][T14827] ? __kasan_slab_free+0x11/0x20 [ 520.522478][T14827] ? kernel_write+0x3c0/0x3c0 [ 520.527338][T14827] ? __fget_files+0x2c4/0x320 [ 520.532035][T14827] ? __fdget_pos+0x1f7/0x380 [ 520.536638][T14827] ? ksys_write+0x71/0x240 [ 520.541077][T14827] ksys_write+0x140/0x240 [ 520.545408][T14827] ? __ia32_sys_read+0x90/0x90 [ 520.550171][T14827] ? fpu__clear_all+0x20/0x20 [ 520.554846][T14827] __x64_sys_write+0x7b/0x90 [ 520.559431][T14827] do_syscall_64+0x31/0x40 [ 520.563848][T14827] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 520.569737][T14827] RIP: 0033:0x7f67f53e9929 [ 520.574154][T14827] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 520.593934][T14827] RSP: 002b:00007f67f3a52038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 520.602346][T14827] RAX: ffffffffffffffda RBX: 00007f67f5610fa0 RCX: 00007f67f53e9929 [ 520.610317][T14827] RDX: 000000000000fdef RSI: 0000200000000300 RDI: 00000000000000c8 [ 520.623153][T14827] RBP: 00007f67f3a52090 R08: 0000000000000000 R09: 0000000000000000 [ 520.631302][T14827] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 520.639289][T14827] R13: 0000000000000000 R14: 00007f67f5610fa0 R15: 00007ffda6d6f088 [ 520.673496][T14832] device pim6reg1 entered promiscuous mode [ 520.790236][T14837] device pim6reg1 entered promiscuous mode [ 520.944439][T14849] device pim6reg1 entered promiscuous mode [ 520.958242][T14848] device pim6reg1 entered promiscuous mode [ 521.118058][T14863] device pim6reg1 entered promiscuous mode [ 521.140468][T14860] @0Ù: renamed from bond_slave_1 [ 521.189291][T14860] device pim6reg1 entered promiscuous mode [ 521.656075][T14888] device pim6reg1 entered promiscuous mode [ 522.248823][T14908] device pim6reg1 entered promiscuous mode [ 523.083366][T14941] device pim6reg1 entered promiscuous mode [ 523.228388][T14947] bridge0: port 2(bridge_slave_1) entered disabled state [ 524.606559][T15016] device pim6reg1 entered promiscuous mode [ 525.410472][T15061] device pim6reg1 entered promiscuous mode [ 525.634295][T15082] @0Ù: renamed from bond_slave_1 [ 525.698182][T15085] device pim6reg1 entered promiscuous mode [ 526.022636][T15111] device pim6reg1 entered promiscuous mode [ 526.538591][T15140] device pim6reg1 entered promiscuous mode [ 526.554934][T15144] device pim6reg1 entered promiscuous mode [ 526.649742][T15148] device pim6reg1 entered promiscuous mode [ 526.840870][T15152] FAULT_INJECTION: forcing a failure. [ 526.840870][T15152] name failslab, interval 1, probability 0, space 0, times 0 [ 526.883873][T15152] CPU: 1 PID: 15152 Comm: syz.4.5138 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 526.895394][T15152] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 526.905458][T15152] Call Trace: [ 526.908765][T15152] __dump_stack+0x21/0x24 [ 526.913088][T15152] dump_stack_lvl+0x169/0x1d8 [ 526.917855][T15152] ? show_regs_print_info+0x18/0x18 [ 526.923043][T15152] dump_stack+0x15/0x1c [ 526.927198][T15152] should_fail+0x3c1/0x510 [ 526.931696][T15152] ? dev_map_alloc+0x68/0x6b0 [ 526.936364][T15152] __should_failslab+0xa4/0xe0 [ 526.941142][T15152] should_failslab+0x9/0x20 [ 526.945637][T15152] kmem_cache_alloc_trace+0x3a/0x2e0 [ 526.950911][T15152] dev_map_alloc+0x68/0x6b0 [ 526.955404][T15152] map_create+0x441/0x2190 [ 526.959996][T15152] __se_sys_bpf+0x203/0x680 [ 526.964596][T15152] ? __x64_sys_bpf+0x90/0x90 [ 526.969207][T15152] __x64_sys_bpf+0x7b/0x90 [ 526.973658][T15152] do_syscall_64+0x31/0x40 [ 526.978070][T15152] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 526.984068][T15152] RIP: 0033:0x7fb45f448929 [ 526.988650][T15152] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 527.008351][T15152] RSP: 002b:00007fb45dab1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 527.016941][T15152] RAX: ffffffffffffffda RBX: 00007fb45f66ffa0 RCX: 00007fb45f448929 [ 527.025045][T15152] RDX: 0000000000000050 RSI: 0000200000000bc0 RDI: 0000000000000000 [ 527.033097][T15152] RBP: 00007fb45dab1090 R08: 0000000000000000 R09: 0000000000000000 [ 527.041162][T15152] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 527.049325][T15152] R13: 0000000000000000 R14: 00007fb45f66ffa0 R15: 00007ffff13a9158 [ 527.833544][T15177] device pim6reg1 entered promiscuous mode [ 527.889783][T15184] device pim6reg1 entered promiscuous mode [ 528.343996][T15212] device pim6reg1 entered promiscuous mode [ 529.203832][T15252] device pim6reg1 entered promiscuous mode [ 529.617230][T15267] FAULT_INJECTION: forcing a failure. [ 529.617230][T15267] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 529.637882][T15267] CPU: 1 PID: 15267 Comm: syz.0.5182 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 529.649416][T15267] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 529.659751][T15267] Call Trace: [ 529.663177][T15267] __dump_stack+0x21/0x24 [ 529.667535][T15267] dump_stack_lvl+0x169/0x1d8 [ 529.672301][T15267] ? thaw_kernel_threads+0x220/0x220 [ 529.677656][T15267] ? vsnprintf+0x1871/0x1960 [ 529.682318][T15267] ? show_regs_print_info+0x18/0x18 [ 529.687590][T15267] dump_stack+0x15/0x1c [ 529.691754][T15267] should_fail+0x3c1/0x510 [ 529.696185][T15267] should_fail_usercopy+0x1a/0x20 [ 529.701504][T15267] _copy_to_user+0x20/0x90 [ 529.705936][T15267] simple_read_from_buffer+0xe9/0x160 [ 529.711811][T15267] proc_fail_nth_read+0x19a/0x210 [ 529.717468][T15267] ? proc_fault_inject_write+0x2f0/0x2f0 [ 529.723443][T15267] ? rw_verify_area+0x1c0/0x360 [ 529.728720][T15267] ? proc_fault_inject_write+0x2f0/0x2f0 [ 529.734564][T15267] vfs_read+0x1fe/0xa10 [ 529.738712][T15267] ? kernel_read+0x70/0x70 [ 529.743673][T15267] ? mutex_lock+0x8c/0xe0 [ 529.748115][T15267] ? __kasan_check_write+0x14/0x20 [ 529.753445][T15267] ? mutex_lock+0x8c/0xe0 [ 529.757806][T15267] ? mutex_trylock+0xa0/0xa0 [ 529.762405][T15267] ? __fget_files+0x2c4/0x320 [ 529.767381][T15267] ? __fdget_pos+0x2d2/0x380 [ 529.772057][T15267] ? ksys_read+0x71/0x240 [ 529.776472][T15267] ksys_read+0x140/0x240 [ 529.780714][T15267] ? vfs_write+0xd60/0xd60 [ 529.785228][T15267] __x64_sys_read+0x7b/0x90 [ 529.789722][T15267] do_syscall_64+0x31/0x40 [ 529.794143][T15267] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 529.800032][T15267] RIP: 0033:0x7f07f6f3633c [ 529.804723][T15267] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 529.824618][T15267] RSP: 002b:00007f07f55a0030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 529.833113][T15267] RAX: ffffffffffffffda RBX: 00007f07f715efa0 RCX: 00007f07f6f3633c [ 529.841164][T15267] RDX: 000000000000000f RSI: 00007f07f55a00a0 RDI: 0000000000000013 [ 529.849537][T15267] RBP: 00007f07f55a0090 R08: 0000000000000000 R09: 0000000000000000 [ 529.857649][T15267] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 529.866257][T15267] R13: 0000000000000000 R14: 00007f07f715efa0 R15: 00007ffe4c70d2a8 [ 530.205248][T15282] device sit0 entered promiscuous mode [ 531.362806][T15332] syz.2.5204[15332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 531.362862][T15332] syz.2.5204[15332] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 531.376260][T15327] device pim6reg1 entered promiscuous mode [ 531.820439][T15362] bridge0: port 2(bridge_slave_1) entered blocking state [ 531.827796][T15362] bridge0: port 2(bridge_slave_1) entered forwarding state [ 531.853620][T15362] device bridge0 entered promiscuous mode [ 531.924441][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 532.213361][T15372] FAULT_INJECTION: forcing a failure. [ 532.213361][T15372] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 532.226934][T15372] CPU: 0 PID: 15372 Comm: syz.3.5216 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 532.238437][T15372] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 532.248521][T15372] Call Trace: [ 532.251955][T15372] __dump_stack+0x21/0x24 [ 532.256332][T15372] dump_stack_lvl+0x169/0x1d8 [ 532.261151][T15372] ? thaw_kernel_threads+0x220/0x220 [ 532.266452][T15372] ? show_regs_print_info+0x18/0x18 [ 532.271827][T15372] ? memcpy+0x56/0x70 [ 532.275971][T15372] dump_stack+0x15/0x1c [ 532.280245][T15372] should_fail+0x3c1/0x510 [ 532.284859][T15372] should_fail_usercopy+0x1a/0x20 [ 532.290321][T15372] _copy_to_user+0x20/0x90 [ 532.294776][T15372] bpf_verifier_vlog+0x1b4/0x330 [ 532.299736][T15372] __btf_verifier_log+0xd1/0x120 [ 532.304694][T15372] ? btf_check_sec_info+0x330/0x330 [ 532.309900][T15372] ? memcpy+0x56/0x70 [ 532.313882][T15372] btf_parse_hdr+0x3b4/0x7b0 [ 532.318476][T15372] btf_new_fd+0x4af/0xa00 [ 532.322800][T15372] bpf_btf_load+0x5e/0x70 [ 532.327121][T15372] __se_sys_bpf+0x48a/0x680 [ 532.331707][T15372] ? __x64_sys_bpf+0x90/0x90 [ 532.336434][T15372] ? fpu__clear_all+0x20/0x20 [ 532.341238][T15372] __x64_sys_bpf+0x7b/0x90 [ 532.345672][T15372] do_syscall_64+0x31/0x40 [ 532.350088][T15372] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 532.355975][T15372] RIP: 0033:0x7f321ddd2929 [ 532.360465][T15372] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 532.380494][T15372] RSP: 002b:00007f321c43b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 532.389079][T15372] RAX: ffffffffffffffda RBX: 00007f321dff9fa0 RCX: 00007f321ddd2929 [ 532.397055][T15372] RDX: 0000000000000028 RSI: 0000200000000a40 RDI: 0000000000000012 [ 532.405128][T15372] RBP: 00007f321c43b090 R08: 0000000000000000 R09: 0000000000000000 [ 532.413393][T15372] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 532.421509][T15372] R13: 0000000000000000 R14: 00007f321dff9fa0 R15: 00007ffed3537c18 [ 533.950363][T15441] device pim6reg1 entered promiscuous mode [ 534.016120][T15446] device pim6reg1 entered promiscuous mode [ 535.378396][T15486] device pim6reg1 entered promiscuous mode [ 535.971442][T15503] device veth1_macvtap left promiscuous mode [ 536.014344][T15503] device veth1_macvtap entered promiscuous mode [ 536.036362][T15503] device macsec0 entered promiscuous mode [ 536.295345][T15517] device pim6reg1 entered promiscuous mode [ 536.488505][T15526] FAULT_INJECTION: forcing a failure. [ 536.488505][T15526] name failslab, interval 1, probability 0, space 0, times 0 [ 536.523606][T15526] CPU: 1 PID: 15526 Comm: syz.0.5270 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 536.535461][T15526] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 536.545605][T15526] Call Trace: [ 536.548988][T15526] __dump_stack+0x21/0x24 [ 536.553498][T15526] dump_stack_lvl+0x169/0x1d8 [ 536.558289][T15526] ? thaw_kernel_threads+0x220/0x220 [ 536.563686][T15526] ? show_regs_print_info+0x18/0x18 [ 536.568995][T15526] dump_stack+0x15/0x1c [ 536.573473][T15526] should_fail+0x3c1/0x510 [ 536.577903][T15526] ? security_file_alloc+0x33/0x120 [ 536.583106][T15526] __should_failslab+0xa4/0xe0 [ 536.587961][T15526] should_failslab+0x9/0x20 [ 536.592654][T15526] kmem_cache_alloc+0x3d/0x2e0 [ 536.597447][T15526] ? __alloc_file+0x28/0x320 [ 536.602118][T15526] security_file_alloc+0x33/0x120 [ 536.607139][T15526] __alloc_file+0xb5/0x320 [ 536.611635][T15526] alloc_empty_file+0x97/0x180 [ 536.616388][T15526] alloc_file+0x59/0x540 [ 536.620711][T15526] alloc_file_pseudo+0x17a/0x1f0 [ 536.625642][T15526] ? alloc_empty_file_noaccount+0x80/0x80 [ 536.631355][T15526] ? _raw_spin_lock_bh+0x8e/0xe0 [ 536.636298][T15526] anon_inode_getfile+0xa6/0x180 [ 536.641228][T15526] bpf_link_prime+0xf0/0x250 [ 536.645902][T15526] bpf_raw_tracepoint_open+0x4c1/0x790 [ 536.651357][T15526] ? bpf_obj_get_info_by_fd+0x2c30/0x2c30 [ 536.657072][T15526] ? selinux_bpf+0xce/0xf0 [ 536.661483][T15526] ? security_bpf+0x82/0xa0 [ 536.666068][T15526] __se_sys_bpf+0x418/0x680 [ 536.670866][T15526] ? __x64_sys_bpf+0x90/0x90 [ 536.675607][T15526] ? fpu__clear_all+0x20/0x20 [ 536.680312][T15526] __x64_sys_bpf+0x7b/0x90 [ 536.684737][T15526] do_syscall_64+0x31/0x40 [ 536.689151][T15526] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 536.695034][T15526] RIP: 0033:0x7f07f6f37929 [ 536.699454][T15526] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 536.719728][T15526] RSP: 002b:00007f07f55a0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 536.728502][T15526] RAX: ffffffffffffffda RBX: 00007f07f715efa0 RCX: 00007f07f6f37929 [ 536.736642][T15526] RDX: 0000000000000010 RSI: 0000200000000080 RDI: 0000000000000011 [ 536.744714][T15526] RBP: 00007f07f55a0090 R08: 0000000000000000 R09: 0000000000000000 [ 536.753029][T15526] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 536.760996][T15526] R13: 0000000000000000 R14: 00007f07f715efa0 R15: 00007ffe4c70d2a8 [ 537.061480][T15546] device syzkaller0 entered promiscuous mode [ 537.449322][T15556] device pim6reg1 entered promiscuous mode [ 538.738235][T15597] device pim6reg1 entered promiscuous mode [ 539.352904][T15632] device pim6reg1 entered promiscuous mode [ 539.527214][T15655] FAULT_INJECTION: forcing a failure. [ 539.527214][T15655] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 539.581460][T15655] CPU: 0 PID: 15655 Comm: syz.1.5317 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 539.593328][T15655] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 539.603398][T15655] Call Trace: [ 539.606703][T15655] __dump_stack+0x21/0x24 [ 539.611163][T15655] dump_stack_lvl+0x169/0x1d8 [ 539.615838][T15655] ? show_regs_print_info+0x18/0x18 [ 539.621381][T15655] ? __hrtimer_run_queues+0x903/0x960 [ 539.627038][T15655] dump_stack+0x15/0x1c [ 539.631376][T15655] should_fail+0x3c1/0x510 [ 539.635805][T15655] should_fail_usercopy+0x1a/0x20 [ 539.641170][T15655] _copy_from_user+0x20/0xd0 [ 539.645751][T15655] __se_sys_bpf+0x181/0x680 [ 539.650347][T15655] ? __x64_sys_bpf+0x90/0x90 [ 539.655230][T15655] ? debug_smp_processor_id+0x17/0x20 [ 539.661027][T15655] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 539.667194][T15655] __x64_sys_bpf+0x7b/0x90 [ 539.671623][T15655] do_syscall_64+0x31/0x40 [ 539.676237][T15655] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 539.682127][T15655] RIP: 0033:0x7f67f53e9929 [ 539.686541][T15655] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 539.706408][T15655] RSP: 002b:00007f67f3a52038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 539.714904][T15655] RAX: ffffffffffffffda RBX: 00007f67f5610fa0 RCX: 00007f67f53e9929 [ 539.723132][T15655] RDX: 0000000000000050 RSI: 0000200000000140 RDI: 2000000000000000 [ 539.731107][T15655] RBP: 00007f67f3a52090 R08: 0000000000000000 R09: 0000000000000000 [ 539.739171][T15655] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 539.747198][T15655] R13: 0000000000000000 R14: 00007f67f5610fa0 R15: 00007ffda6d6f088 [ 540.320532][T15686] device pim6reg1 entered promiscuous mode [ 540.991919][T15715] device pim6reg1 entered promiscuous mode [ 541.282430][T15721] device pim6reg1 entered promiscuous mode [ 541.731408][T15736] FAULT_INJECTION: forcing a failure. [ 541.731408][T15736] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 541.835347][T15736] CPU: 1 PID: 15736 Comm: syz.1.5345 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 541.847303][T15736] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 541.858369][T15736] Call Trace: [ 541.862241][T15736] __dump_stack+0x21/0x24 [ 541.866916][T15736] dump_stack_lvl+0x169/0x1d8 [ 541.871856][T15736] ? thaw_kernel_threads+0x220/0x220 [ 541.877400][T15736] ? show_regs_print_info+0x18/0x18 [ 541.882985][T15736] dump_stack+0x15/0x1c [ 541.887171][T15736] should_fail+0x3c1/0x510 [ 541.891903][T15736] should_fail_usercopy+0x1a/0x20 [ 541.896978][T15736] strncpy_from_user+0x24/0x2e0 [ 541.901955][T15736] ? kmem_cache_alloc+0x165/0x2e0 [ 541.907016][T15736] ? getname_flags+0xb9/0x500 [ 541.911814][T15736] getname_flags+0xf4/0x500 [ 541.916780][T15736] do_mkdirat+0x4b/0x340 [ 541.921161][T15736] __x64_sys_mkdirat+0x7b/0x90 [ 541.926469][T15736] do_syscall_64+0x31/0x40 [ 541.931260][T15736] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 541.937530][T15736] RIP: 0033:0x7f67f53e9929 [ 541.942485][T15736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 541.963567][T15736] RSP: 002b:00007f67f3a52038 EFLAGS: 00000246 ORIG_RAX: 0000000000000102 [ 541.972189][T15736] RAX: ffffffffffffffda RBX: 00007f67f5610fa0 RCX: 00007f67f53e9929 [ 541.980184][T15736] RDX: 00000000000001ff RSI: 00002000000003c0 RDI: ffffffffffffffff [ 541.988530][T15736] RBP: 00007f67f3a52090 R08: 0000000000000000 R09: 0000000000000000 [ 541.997092][T15736] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 542.005089][T15736] R13: 0000000000000000 R14: 00007f67f5610fa0 R15: 00007ffda6d6f088 [ 542.241972][T15750] device pim6reg1 entered promiscuous mode [ 542.346790][T15752] device pim6reg1 entered promiscuous mode [ 542.780214][T15775] device pim6reg1 entered promiscuous mode [ 543.121664][T15784] device pim6reg1 entered promiscuous mode [ 543.460539][T15805] device pim6reg1 entered promiscuous mode [ 543.713578][T15818] device pim6reg1 entered promiscuous mode [ 543.797184][T15816] device veth0_vlan left promiscuous mode [ 543.829143][T15816] device veth0_vlan entered promiscuous mode [ 543.887319][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 543.905835][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 543.916812][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 544.090730][T15836] device pim6reg1 entered promiscuous mode [ 546.034981][T15914] device syzkaller0 entered promiscuous mode [ 546.200412][T15919] device wg2 left promiscuous mode [ 546.516107][T15937] device pim6reg1 entered promiscuous mode [ 546.551455][T15939] device sit0 left promiscuous mode [ 546.813284][T15964] FAULT_INJECTION: forcing a failure. [ 546.813284][T15964] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 546.826931][T15964] CPU: 1 PID: 15964 Comm: syz.0.5432 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 546.838779][T15964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 546.850206][T15964] Call Trace: [ 546.854022][T15964] __dump_stack+0x21/0x24 [ 546.858456][T15964] dump_stack_lvl+0x169/0x1d8 [ 546.863162][T15964] ? thaw_kernel_threads+0x220/0x220 [ 546.868483][T15964] ? show_regs_print_info+0x18/0x18 [ 546.873781][T15964] ? ppp_write+0xb6/0x370 [ 546.878600][T15964] dump_stack+0x15/0x1c [ 546.882784][T15964] should_fail+0x3c1/0x510 [ 546.887567][T15964] should_fail_usercopy+0x1a/0x20 [ 546.892911][T15964] _copy_from_user+0x20/0xd0 [ 546.897503][T15964] ppp_write+0x174/0x370 [ 546.901745][T15964] ? ppp_read+0x750/0x750 [ 546.906075][T15964] vfs_write+0x32d/0xd60 [ 546.910349][T15964] ? kernel_write+0x3c0/0x3c0 [ 546.915027][T15964] ? __fget_files+0x2c4/0x320 [ 546.919915][T15964] ? __fdget_pos+0x1f7/0x380 [ 546.924690][T15964] ? ksys_write+0x71/0x240 [ 546.929253][T15964] ksys_write+0x140/0x240 [ 546.933772][T15964] ? __ia32_sys_read+0x90/0x90 [ 546.938549][T15964] ? fpu__clear_all+0x20/0x20 [ 546.943235][T15964] __x64_sys_write+0x7b/0x90 [ 546.947917][T15964] do_syscall_64+0x31/0x40 [ 546.952333][T15964] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 546.958584][T15964] RIP: 0033:0x7f07f6f37929 [ 546.963086][T15964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 546.983341][T15964] RSP: 002b:00007f07f55a0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 546.992063][T15964] RAX: ffffffffffffffda RBX: 00007f07f715efa0 RCX: 00007f07f6f37929 [ 547.000223][T15964] RDX: 0000000000000012 RSI: 00002000000002c0 RDI: 0000000000000003 [ 547.008191][T15964] RBP: 00007f07f55a0090 R08: 0000000000000000 R09: 0000000000000000 [ 547.016165][T15964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 547.024151][T15964] R13: 0000000000000000 R14: 00007f07f715efa0 R15: 00007ffe4c70d2a8 [ 548.219947][T16010] device pim6reg1 entered promiscuous mode [ 548.436053][T16019] device pim6reg1 entered promiscuous mode [ 548.636276][T16028] device pim6reg1 entered promiscuous mode [ 548.907350][T16035] device syzkaller0 entered promiscuous mode [ 549.093906][T16046] device pim6reg1 entered promiscuous mode [ 549.179290][T16056] device pim6reg1 entered promiscuous mode [ 549.582834][T16091] device pim6reg1 entered promiscuous mode [ 549.600612][T16093] device pim6reg1 entered promiscuous mode [ 549.673329][T16101] FAULT_INJECTION: forcing a failure. [ 549.673329][T16101] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 549.727259][T16101] CPU: 1 PID: 16101 Comm: syz.1.5482 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 549.738888][T16101] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 549.749229][T16101] Call Trace: [ 549.752545][T16101] __dump_stack+0x21/0x24 [ 549.757064][T16101] dump_stack_lvl+0x169/0x1d8 [ 549.761749][T16101] ? show_regs_print_info+0x18/0x18 [ 549.766958][T16101] dump_stack+0x15/0x1c [ 549.771116][T16101] should_fail+0x3c1/0x510 [ 549.775553][T16101] should_fail_usercopy+0x1a/0x20 [ 549.780580][T16101] copy_page_from_iter+0x381/0x6c0 [ 549.785973][T16101] pipe_write+0x914/0x1890 [ 549.790478][T16101] ? pipe_write+0x151/0x1890 [ 549.795163][T16101] ? pipe_read+0xfe0/0xfe0 [ 549.799585][T16101] ? fsnotify_perm+0x66/0x4b0 [ 549.804266][T16101] ? security_file_permission+0x83/0xa0 [ 549.810095][T16101] ? iov_iter_init+0x3f/0x120 [ 549.814789][T16101] vfs_write+0x725/0xd60 [ 549.819036][T16101] ? putname+0xfe/0x150 [ 549.823219][T16101] ? kernel_write+0x3c0/0x3c0 [ 549.828216][T16101] ? __fget_files+0x2c4/0x320 [ 549.832983][T16101] ? __fdget_pos+0x1f7/0x380 [ 549.837717][T16101] ? ksys_write+0x71/0x240 [ 549.842227][T16101] ksys_write+0x140/0x240 [ 549.846563][T16101] ? __ia32_sys_read+0x90/0x90 [ 549.851329][T16101] ? fpu__clear_all+0x20/0x20 [ 549.856095][T16101] __x64_sys_write+0x7b/0x90 [ 549.860791][T16101] do_syscall_64+0x31/0x40 [ 549.865320][T16101] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 549.871226][T16101] RIP: 0033:0x7f67f53e9929 [ 549.875696][T16101] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 549.895492][T16101] RSP: 002b:00007f67f3a52038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 549.904139][T16101] RAX: ffffffffffffffda RBX: 00007f67f5610fa0 RCX: 00007f67f53e9929 [ 549.912129][T16101] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 0000000000000000 [ 549.920121][T16101] RBP: 00007f67f3a52090 R08: 0000000000000000 R09: 0000000000000000 [ 549.928475][T16101] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 549.936563][T16101] R13: 0000000000000000 R14: 00007f67f5610fa0 R15: 00007ffda6d6f088 [ 550.835547][T16114] device veth0_vlan left promiscuous mode [ 550.886683][T16114] device veth0_vlan entered promiscuous mode [ 551.065149][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 551.073434][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 551.082105][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 551.778746][T16133] device pim6reg1 entered promiscuous mode [ 551.841867][T16132] device pim6reg1 entered promiscuous mode [ 552.995115][T16148] device veth0_vlan left promiscuous mode [ 553.014961][T16148] device veth0_vlan entered promiscuous mode [ 553.048708][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 553.070283][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 553.088870][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 553.164544][T16168] device pim6reg1 entered promiscuous mode [ 553.675343][T16185] device pim6reg1 entered promiscuous mode [ 554.040899][T16204] ÿÿÿÿÿÿ: renamed from vlan1 [ 554.133460][T16210] device pim6reg1 entered promiscuous mode [ 554.418502][T16212] device veth0_vlan left promiscuous mode [ 554.450294][T16212] device veth0_vlan entered promiscuous mode [ 554.522885][T16215] device pim6reg1 entered promiscuous mode [ 554.983238][T16240] FAULT_INJECTION: forcing a failure. [ 554.983238][T16240] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 555.053876][T16240] CPU: 1 PID: 16240 Comm: syz.4.5529 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 555.065560][T16240] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 555.075844][T16240] Call Trace: [ 555.080276][T16240] __dump_stack+0x21/0x24 [ 555.084710][T16240] dump_stack_lvl+0x169/0x1d8 [ 555.089503][T16240] ? thaw_kernel_threads+0x220/0x220 [ 555.094929][T16240] ? show_regs_print_info+0x18/0x18 [ 555.100677][T16240] dump_stack+0x15/0x1c [ 555.105085][T16240] should_fail+0x3c1/0x510 [ 555.109583][T16240] should_fail_usercopy+0x1a/0x20 [ 555.114721][T16240] _copy_to_user+0x20/0x90 [ 555.119571][T16240] bpf_verifier_vlog+0x1b4/0x330 [ 555.125193][T16240] btf_verifier_log+0x1dc/0x2a0 [ 555.130260][T16240] ? __btf_verifier_log+0xd1/0x120 [ 555.135503][T16240] ? btf_id_cmp_func+0x80/0x80 [ 555.140581][T16240] ? unwind_get_return_address+0x4d/0x90 [ 555.146592][T16240] ? stack_trace_save+0xe0/0xe0 [ 555.151476][T16240] btf_enum_log+0x5d/0xa0 [ 555.155811][T16240] __btf_verifier_log_type+0x3f9/0x610 [ 555.161356][T16240] ? btf_int_show+0x2bf0/0x2bf0 [ 555.166381][T16240] btf_enum_check_meta+0x43a/0xa90 [ 555.171681][T16240] btf_check_all_metas+0x230/0x820 [ 555.176907][T16240] ? __btf_verifier_log+0x120/0x120 [ 555.182437][T16240] btf_parse_type_sec+0xea/0x15a0 [ 555.187871][T16240] ? btf_check_sec_info+0x27a/0x330 [ 555.193250][T16240] ? btf_check_sec_info+0x330/0x330 [ 555.198463][T16240] ? btf_verifier_log+0x2a0/0x2a0 [ 555.203497][T16240] ? memcpy+0x56/0x70 [ 555.207583][T16240] ? btf_parse_hdr+0x5d6/0x7b0 [ 555.212342][T16240] ? btf_parse_str_sec+0x1aa/0x260 [ 555.217457][T16240] btf_new_fd+0x562/0xa00 [ 555.221792][T16240] bpf_btf_load+0x5e/0x70 [ 555.226119][T16240] __se_sys_bpf+0x48a/0x680 [ 555.230626][T16240] ? __x64_sys_bpf+0x90/0x90 [ 555.235300][T16240] ? fpu__clear_all+0x20/0x20 [ 555.240171][T16240] __x64_sys_bpf+0x7b/0x90 [ 555.244700][T16240] do_syscall_64+0x31/0x40 [ 555.249381][T16240] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 555.255446][T16240] RIP: 0033:0x7fb45f448929 [ 555.260007][T16240] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 555.279696][T16240] RSP: 002b:00007fb45dab1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 555.288118][T16240] RAX: ffffffffffffffda RBX: 00007fb45f66ffa0 RCX: 00007fb45f448929 [ 555.296703][T16240] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 0000000000000012 [ 555.305195][T16240] RBP: 00007fb45dab1090 R08: 0000000000000000 R09: 0000000000000000 [ 555.313281][T16240] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 555.321343][T16240] R13: 0000000000000000 R14: 00007fb45f66ffa0 R15: 00007ffff13a9158 [ 555.431676][T16243] device pim6reg1 entered promiscuous mode [ 555.587218][T16245] device syzkaller0 entered promiscuous mode [ 555.612407][T16253] bridge0: port 2(bridge_slave_1) entered disabled state [ 555.653905][T16253] device bridge0 left promiscuous mode [ 555.662362][T16252] device pim6reg1 entered promiscuous mode [ 556.918732][T16295] device pim6reg1 entered promiscuous mode [ 557.880832][T16338] device pim6reg1 entered promiscuous mode [ 558.716094][T16370] device pim6reg1 entered promiscuous mode [ 559.126151][T16396] FAULT_INJECTION: forcing a failure. [ 559.126151][T16396] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 559.149415][T16396] CPU: 0 PID: 16396 Comm: syz.3.5582 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 559.161035][T16396] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 559.171466][T16396] Call Trace: [ 559.174792][T16396] __dump_stack+0x21/0x24 [ 559.179254][T16396] dump_stack_lvl+0x169/0x1d8 [ 559.183952][T16396] ? thaw_kernel_threads+0x220/0x220 [ 559.189367][T16396] ? show_regs_print_info+0x18/0x18 [ 559.194696][T16396] ? memcpy+0x56/0x70 [ 559.198762][T16396] dump_stack+0x15/0x1c [ 559.202928][T16396] should_fail+0x3c1/0x510 [ 559.207559][T16396] should_fail_usercopy+0x1a/0x20 [ 559.212600][T16396] _copy_to_user+0x20/0x90 [ 559.217295][T16396] bpf_verifier_vlog+0x1b4/0x330 [ 559.222346][T16396] __btf_verifier_log+0xd1/0x120 [ 559.227513][T16396] ? btf_id_cmp_func+0x80/0x80 [ 559.232564][T16396] ? btf_check_sec_info+0x330/0x330 [ 559.237880][T16396] __btf_verifier_log_type+0x4a0/0x610 [ 559.243638][T16396] ? btf_sec_info_cmp+0x5f/0x110 [ 559.248613][T16396] ? btf_int_show+0x2bf0/0x2bf0 [ 559.253599][T16396] ? sort_r+0xe04/0xe20 [ 559.257800][T16396] btf_array_check_meta+0x1e5/0x2c0 [ 559.263009][T16396] btf_check_all_metas+0x230/0x820 [ 559.268135][T16396] ? __btf_verifier_log+0x120/0x120 [ 559.273558][T16396] btf_parse_type_sec+0xea/0x15a0 [ 559.278641][T16396] ? btf_check_sec_info+0x27a/0x330 [ 559.283876][T16396] ? btf_check_sec_info+0x330/0x330 [ 559.289308][T16396] ? btf_verifier_log+0x2a0/0x2a0 [ 559.294625][T16396] ? memcpy+0x56/0x70 [ 559.298626][T16396] ? btf_parse_hdr+0x5d6/0x7b0 [ 559.303539][T16396] ? btf_parse_str_sec+0x1aa/0x260 [ 559.308746][T16396] btf_new_fd+0x562/0xa00 [ 559.313081][T16396] bpf_btf_load+0x5e/0x70 [ 559.317414][T16396] __se_sys_bpf+0x48a/0x680 [ 559.322004][T16396] ? __x64_sys_bpf+0x90/0x90 [ 559.326621][T16396] __x64_sys_bpf+0x7b/0x90 [ 559.331041][T16396] do_syscall_64+0x31/0x40 [ 559.335554][T16396] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 559.341444][T16396] RIP: 0033:0x7f321ddd2929 [ 559.345868][T16396] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 559.365566][T16396] RSP: 002b:00007f321c43b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 559.374006][T16396] RAX: ffffffffffffffda RBX: 00007f321dff9fa0 RCX: 00007f321ddd2929 [ 559.382010][T16396] RDX: 0000000000000028 RSI: 0000200000000280 RDI: 0000000000000012 [ 559.390044][T16396] RBP: 00007f321c43b090 R08: 0000000000000000 R09: 0000000000000000 [ 559.398456][T16396] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 559.406532][T16396] R13: 0000000000000001 R14: 00007f321dff9fa0 R15: 00007ffed3537c18 [ 559.584672][T16410] device pim6reg1 entered promiscuous mode [ 560.165846][T16438] FAULT_INJECTION: forcing a failure. [ 560.165846][T16438] name failslab, interval 1, probability 0, space 0, times 0 [ 560.241584][T16438] CPU: 1 PID: 16438 Comm: syz.4.5597 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 560.253106][T16438] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 560.263574][T16438] Call Trace: [ 560.267162][T16438] __dump_stack+0x21/0x24 [ 560.271506][T16438] dump_stack_lvl+0x169/0x1d8 [ 560.276196][T16438] ? show_regs_print_info+0x18/0x18 [ 560.281540][T16438] dump_stack+0x15/0x1c [ 560.286309][T16438] should_fail+0x3c1/0x510 [ 560.290736][T16438] ? prepare_creds+0x2c/0x5d0 [ 560.295575][T16438] __should_failslab+0xa4/0xe0 [ 560.300357][T16438] should_failslab+0x9/0x20 [ 560.305004][T16438] kmem_cache_alloc+0x3d/0x2e0 [ 560.309779][T16438] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 560.315443][T16438] prepare_creds+0x2c/0x5d0 [ 560.320267][T16438] ? copy_creds+0x7b/0x480 [ 560.324895][T16438] copy_creds+0xe5/0x480 [ 560.329169][T16438] copy_process+0x957/0x32c0 [ 560.333903][T16438] ? memset+0x35/0x40 [ 560.338020][T16438] ? proc_fail_nth_read+0x210/0x210 [ 560.343339][T16438] ? __pidfd_prepare+0x150/0x150 [ 560.348327][T16438] ? rw_verify_area+0x1c0/0x360 [ 560.353357][T16438] ? vfs_write+0xac8/0xd60 [ 560.358098][T16438] kernel_clone+0x23f/0x940 [ 560.362615][T16438] ? kernel_write+0x3c0/0x3c0 [ 560.367304][T16438] ? create_io_thread+0x130/0x130 [ 560.372345][T16438] ? mutex_lock+0x8c/0xe0 [ 560.377091][T16438] __x64_sys_clone+0x176/0x1d0 [ 560.382453][T16438] ? __ia32_sys_vfork+0xf0/0xf0 [ 560.387316][T16438] ? ksys_write+0x1eb/0x240 [ 560.391834][T16438] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 560.398001][T16438] do_syscall_64+0x31/0x40 [ 560.402517][T16438] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 560.408417][T16438] RIP: 0033:0x7fb45f448929 [ 560.412846][T16438] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 560.432748][T16438] RSP: 002b:00007fb45dab0fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 560.441295][T16438] RAX: ffffffffffffffda RBX: 00007fb45f66ffa0 RCX: 00007fb45f448929 [ 560.450350][T16438] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000a49a4400 [ 560.458455][T16438] RBP: 00007fb45dab1090 R08: ffffffffff600000 R09: ffffffffff600000 [ 560.466478][T16438] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 560.474648][T16438] R13: 0000000000000000 R14: 00007fb45f66ffa0 R15: 00007ffff13a9158 [ 560.566071][T16442] device pim6reg1 entered promiscuous mode [ 560.592685][T16449] device pim6reg1 entered promiscuous mode [ 561.248483][T16478] device pim6reg1 entered promiscuous mode [ 561.362655][T16481] device veth0_vlan left promiscuous mode [ 561.391786][T16481] device veth0_vlan entered promiscuous mode [ 561.454417][T16484] device pim6reg1 entered promiscuous mode [ 561.993204][T16510] device pim6reg1 entered promiscuous mode [ 562.165093][T16520] device pim6reg1 entered promiscuous mode [ 562.184148][T16523] device pim6reg1 entered promiscuous mode [ 562.349294][T16540] device sit0 left promiscuous mode [ 562.396171][T16533] device sit0 entered promiscuous mode [ 562.491357][T16546] device pim6reg1 entered promiscuous mode [ 562.675924][T16552] device pim6reg1 entered promiscuous mode [ 562.807268][T16564] @0Ù: renamed from bond_slave_1 [ 562.819058][T16564] device pim6reg1 entered promiscuous mode [ 570.551248][T16577] device pim6reg1 entered promiscuous mode [ 570.559537][T16579] FAULT_INJECTION: forcing a failure. [ 570.559537][T16579] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 570.575265][T16579] CPU: 0 PID: 16579 Comm: syz.2.5649 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 570.586707][T16579] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 570.597074][T16579] Call Trace: [ 570.600634][T16579] __dump_stack+0x21/0x24 [ 570.605308][T16579] dump_stack_lvl+0x169/0x1d8 [ 570.610337][T16579] ? show_regs_print_info+0x18/0x18 [ 570.616041][T16579] dump_stack+0x15/0x1c [ 570.620216][T16579] should_fail+0x3c1/0x510 [ 570.624641][T16579] should_fail_alloc_page+0x4f/0x60 [ 570.629864][T16579] __alloc_pages_nodemask+0x109/0x5f0 [ 570.635240][T16579] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 570.640782][T16579] ? __kmalloc_track_caller+0x181/0x320 [ 570.646333][T16579] ? kmem_cache_alloc+0x165/0x2e0 [ 570.651354][T16579] ? kasan_unpoison+0x67/0x90 [ 570.656029][T16579] ? __kasan_check_write+0x14/0x20 [ 570.661432][T16579] ? __alloc_skb+0x38b/0x520 [ 570.666027][T16579] alloc_skb_with_frags+0x1bc/0x560 [ 570.671223][T16579] sock_alloc_send_pskb+0x853/0x980 [ 570.676507][T16579] ? is_bpf_text_address+0x177/0x190 [ 570.681878][T16579] ? sock_kzfree_s+0x60/0x60 [ 570.686603][T16579] ? iov_iter_advance+0x1f7/0x750 [ 570.691631][T16579] tun_get_user+0x4bd/0x3090 [ 570.696569][T16579] ? ____kasan_slab_free+0x125/0x160 [ 570.702155][T16579] ? __kasan_slab_free+0x11/0x20 [ 570.707114][T16579] ? putname+0xfe/0x150 [ 570.711365][T16579] ? __x64_sys_openat+0x136/0x160 [ 570.716435][T16579] ? do_syscall_64+0x31/0x40 [ 570.721039][T16579] ? tun_do_read+0x1c00/0x1c00 [ 570.725961][T16579] ? kstrtouint_from_user+0x1a0/0x200 [ 570.731431][T16579] ? __fsnotify_parent+0x5f5/0x6c0 [ 570.736543][T16579] ? avc_policy_seqno+0x1b/0x70 [ 570.741605][T16579] ? selinux_file_permission+0x2a5/0x510 [ 570.747232][T16579] ? fsnotify_perm+0x66/0x4b0 [ 570.752253][T16579] tun_chr_write_iter+0x1bf/0x270 [ 570.757382][T16579] vfs_write+0x725/0xd60 [ 570.761616][T16579] ? kernel_write+0x3c0/0x3c0 [ 570.766333][T16579] ? __fget_files+0x2c4/0x320 [ 570.771004][T16579] ? __fdget_pos+0x1f7/0x380 [ 570.775586][T16579] ? ksys_write+0x71/0x240 [ 570.779996][T16579] ksys_write+0x140/0x240 [ 570.784628][T16579] ? __ia32_sys_read+0x90/0x90 [ 570.789399][T16579] ? fpu__clear_all+0x20/0x20 [ 570.794072][T16579] __x64_sys_write+0x7b/0x90 [ 570.798659][T16579] do_syscall_64+0x31/0x40 [ 570.803075][T16579] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 570.808965][T16579] RIP: 0033:0x7f88498ee929 [ 570.813466][T16579] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 570.833524][T16579] RSP: 002b:00007f8847f57038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 570.842103][T16579] RAX: ffffffffffffffda RBX: 00007f8849b15fa0 RCX: 00007f88498ee929 [ 570.850671][T16579] RDX: 000000000000ffdd RSI: 0000200000000100 RDI: 0000000000000003 [ 570.859020][T16579] RBP: 00007f8847f57090 R08: 0000000000000000 R09: 0000000000000000 [ 570.866994][T16579] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 570.874965][T16579] R13: 0000000000000000 R14: 00007f8849b15fa0 R15: 00007fffb35dea58 [ 570.923382][T16589] device pim6reg1 entered promiscuous mode [ 571.522186][T16603] device syzkaller0 entered promiscuous mode [ 572.027920][T16624] device pim6reg1 entered promiscuous mode [ 572.272777][T16634] FAULT_INJECTION: forcing a failure. [ 572.272777][T16634] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 572.286044][T16634] CPU: 1 PID: 16634 Comm: syz.0.5672 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 572.298113][T16634] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 572.308268][T16634] Call Trace: [ 572.311581][T16634] __dump_stack+0x21/0x24 [ 572.316020][T16634] dump_stack_lvl+0x169/0x1d8 [ 572.320711][T16634] ? thaw_kernel_threads+0x220/0x220 [ 572.326011][T16634] ? show_regs_print_info+0x18/0x18 [ 572.331218][T16634] dump_stack+0x15/0x1c [ 572.335619][T16634] should_fail+0x3c1/0x510 [ 572.340132][T16634] should_fail_usercopy+0x1a/0x20 [ 572.345170][T16634] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 572.351424][T16634] generic_perform_write+0x326/0x510 [ 572.356926][T16634] ? atime_needs_update+0x5b0/0x5b0 [ 572.362164][T16634] ? grab_cache_page_write_begin+0xb0/0xb0 [ 572.367978][T16634] ? file_remove_privs+0x580/0x580 [ 572.373097][T16634] ? __fsnotify_parent+0x5f5/0x6c0 [ 572.378311][T16634] ? __kasan_check_write+0x14/0x20 [ 572.383516][T16634] ? down_write+0xac/0x110 [ 572.387979][T16634] __generic_file_write_iter+0x24b/0x480 [ 572.394233][T16634] ? generic_write_checks+0x3d4/0x480 [ 572.400111][T16634] generic_file_write_iter+0xa9/0x1d0 [ 572.405870][T16634] vfs_write+0x725/0xd60 [ 572.410479][T16634] ? __kasan_slab_free+0x11/0x20 [ 572.415439][T16634] ? kernel_write+0x3c0/0x3c0 [ 572.420119][T16634] ? mutex_trylock+0xa0/0xa0 [ 572.424797][T16634] ? __fget_files+0x2c4/0x320 [ 572.429471][T16634] ? __fdget_pos+0x2d2/0x380 [ 572.434079][T16634] ? ksys_write+0x71/0x240 [ 572.438671][T16634] ksys_write+0x140/0x240 [ 572.443086][T16634] ? __ia32_sys_read+0x90/0x90 [ 572.447849][T16634] ? fpu__clear_all+0x20/0x20 [ 572.452694][T16634] __x64_sys_write+0x7b/0x90 [ 572.457400][T16634] do_syscall_64+0x31/0x40 [ 572.461897][T16634] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 572.467798][T16634] RIP: 0033:0x7f07f6f37929 [ 572.472304][T16634] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 572.492617][T16634] RSP: 002b:00007f07f55a0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 572.501738][T16634] RAX: ffffffffffffffda RBX: 00007f07f715efa0 RCX: 00007f07f6f37929 [ 572.509965][T16634] RDX: 0000000000040010 RSI: 0000200000000180 RDI: 0000000000000009 [ 572.518017][T16634] RBP: 00007f07f55a0090 R08: 0000000000000000 R09: 0000000000000000 [ 572.525979][T16634] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 572.534116][T16634] R13: 0000000000000000 R14: 00007f07f715efa0 R15: 00007ffe4c70d2a8 [ 572.901529][T16656] device pim6reg1 entered promiscuous mode [ 572.995052][T16663] FAULT_INJECTION: forcing a failure. [ 572.995052][T16663] name failslab, interval 1, probability 0, space 0, times 0 [ 573.008138][T16663] CPU: 0 PID: 16663 Comm: syz.4.5683 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 573.019665][T16663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 573.029946][T16663] Call Trace: [ 573.033264][T16663] __dump_stack+0x21/0x24 [ 573.037786][T16663] dump_stack_lvl+0x169/0x1d8 [ 573.042487][T16663] ? show_regs_print_info+0x18/0x18 [ 573.047775][T16663] dump_stack+0x15/0x1c [ 573.052490][T16663] should_fail+0x3c1/0x510 [ 573.056922][T16663] ? skb_ext_add+0x13a/0x740 [ 573.061506][T16663] __should_failslab+0xa4/0xe0 [ 573.066535][T16663] should_failslab+0x9/0x20 [ 573.071729][T16663] kmem_cache_alloc+0x3d/0x2e0 [ 573.076872][T16663] ? ip6_rt_copy_init+0x609/0x7f0 [ 573.081981][T16663] skb_ext_add+0x13a/0x740 [ 573.086593][T16663] xfrm_input+0x34a/0x69d0 [ 573.091200][T16663] ? ipv6_chk_addr_and_flags+0x3e/0x60 [ 573.097458][T16663] ? ip6_tnl_rcv_ctl+0x237/0x410 [ 573.102649][T16663] vti6_input_proto+0x392/0x4f0 [ 573.107503][T16663] vti6_rcv_tunnel+0xba/0xe0 [ 573.112172][T16663] tunnel6_rcv+0x9d/0x1a0 [ 573.116714][T16663] ip6_protocol_deliver_rcu+0xa77/0x1340 [ 573.122437][T16663] ip6_input+0xd6/0x1f0 [ 573.126691][T16663] ? ip6_protocol_deliver_rcu+0x1340/0x1340 [ 573.133074][T16663] ? ip6_input+0x1f0/0x1f0 [ 573.137604][T16663] ? ip6table_raw_hook+0x6a/0x80 [ 573.142579][T16663] ? ip6table_mangle_net_exit+0x80/0x80 [ 573.148304][T16663] ip6_rcv_finish+0x18c/0x360 [ 573.152988][T16663] ipv6_rcv+0xec/0x210 [ 573.157397][T16663] ? ip6_rcv_finish+0x360/0x360 [ 573.162390][T16663] ? refcount_add+0x80/0x80 [ 573.166918][T16663] ? ip6_rcv_finish+0x360/0x360 [ 573.171780][T16663] __netif_receive_skb+0xc8/0x280 [ 573.176822][T16663] ? asm_exc_page_fault+0x1e/0x30 [ 573.182269][T16663] netif_receive_skb+0x9b/0x3d0 [ 573.187314][T16663] ? netif_receive_skb_core+0x100/0x100 [ 573.193040][T16663] ? virtio_net_hdr_to_skb+0x6d1/0x10c0 [ 573.198587][T16663] tun_rx_batched+0x5e8/0x710 [ 573.203521][T16663] ? local_bh_enable+0x30/0x30 [ 573.208774][T16663] tun_get_user+0x25d0/0x3090 [ 573.213533][T16663] ? tun_do_read+0x1c00/0x1c00 [ 573.218443][T16663] ? kstrtouint_from_user+0x1a0/0x200 [ 573.224413][T16663] ? __fsnotify_parent+0x5f5/0x6c0 [ 573.229530][T16663] ? avc_policy_seqno+0x1b/0x70 [ 573.234902][T16663] ? selinux_file_permission+0x2a5/0x510 [ 573.240656][T16663] ? fsnotify_perm+0x66/0x4b0 [ 573.245605][T16663] tun_chr_write_iter+0x1bf/0x270 [ 573.250797][T16663] vfs_write+0x725/0xd60 [ 573.255985][T16663] ? kernel_write+0x3c0/0x3c0 [ 573.260759][T16663] ? __fget_files+0x2c4/0x320 [ 573.266306][T16663] ? __fdget_pos+0x1f7/0x380 [ 573.270889][T16663] ? ksys_write+0x71/0x240 [ 573.275301][T16663] ksys_write+0x140/0x240 [ 573.279627][T16663] ? __ia32_sys_read+0x90/0x90 [ 573.285012][T16663] ? fpu__clear_all+0x20/0x20 [ 573.290001][T16663] __x64_sys_write+0x7b/0x90 [ 573.294694][T16663] do_syscall_64+0x31/0x40 [ 573.299117][T16663] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 573.305035][T16663] RIP: 0033:0x7fb45f448929 [ 573.309633][T16663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 573.329598][T16663] RSP: 002b:00007fb45dab1038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 573.338652][T16663] RAX: ffffffffffffffda RBX: 00007fb45f66ffa0 RCX: 00007fb45f448929 [ 573.347090][T16663] RDX: 000000000000fdef RSI: 0000200000000300 RDI: 00000000000000c8 [ 573.355071][T16663] RBP: 00007fb45dab1090 R08: 0000000000000000 R09: 0000000000000000 [ 573.363129][T16663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 573.371101][T16663] R13: 0000000000000000 R14: 00007fb45f66ffa0 R15: 00007ffff13a9158 [ 573.909985][T16692] device pim6reg1 entered promiscuous mode [ 573.922114][T16696] device pim6reg1 entered promiscuous mode [ 574.101099][T16701] device pim6reg1 entered promiscuous mode [ 574.148782][T16700] device sit0 left promiscuous mode [ 574.490546][T16730] device pim6reg1 entered promiscuous mode [ 574.524860][T16728] device pim6reg1 entered promiscuous mode [ 574.820958][T16753] device pim6reg1 entered promiscuous mode [ 575.240797][T16769] device pim6reg1 entered promiscuous mode [ 575.279351][T16773] FAULT_INJECTION: forcing a failure. [ 575.279351][T16773] name failslab, interval 1, probability 0, space 0, times 0 [ 575.292204][T16773] CPU: 1 PID: 16773 Comm: syz.2.5728 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 575.303664][T16773] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 575.313743][T16773] Call Trace: [ 575.317147][T16773] __dump_stack+0x21/0x24 [ 575.321487][T16773] dump_stack_lvl+0x169/0x1d8 [ 575.326166][T16773] ? thaw_kernel_threads+0x220/0x220 [ 575.331649][T16773] ? show_regs_print_info+0x18/0x18 [ 575.336930][T16773] ? __kasan_check_write+0x14/0x20 [ 575.342036][T16773] ? skb_release_data+0x3b3/0x670 [ 575.347055][T16773] dump_stack+0x15/0x1c [ 575.351215][T16773] should_fail+0x3c1/0x510 [ 575.355673][T16773] ? skb_clone+0x1e9/0x380 [ 575.360655][T16773] __should_failslab+0xa4/0xe0 [ 575.365722][T16773] should_failslab+0x9/0x20 [ 575.370251][T16773] kmem_cache_alloc+0x3d/0x2e0 [ 575.375058][T16773] ? __bpf_redirect+0x6a7/0xe30 [ 575.379924][T16773] skb_clone+0x1e9/0x380 [ 575.384197][T16773] bpf_clone_redirect+0xa7/0x380 [ 575.389142][T16773] bpf_prog_6893982b85ceadf7+0x56/0x73c [ 575.394705][T16773] ? sk_get_meminfo+0x240/0x490 [ 575.400025][T16773] ? bpf_prog_test_run_skb+0x31d/0x10b0 [ 575.405743][T16773] ? bpf_prog_test_run+0x350/0x3c0 [ 575.410844][T16773] ? __se_sys_bpf+0x49f/0x680 [ 575.415512][T16773] ? __x64_sys_bpf+0x7b/0x90 [ 575.420112][T16773] ? do_syscall_64+0x31/0x40 [ 575.424705][T16773] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 575.431301][T16773] ? __kasan_check_read+0x11/0x20 [ 575.436523][T16773] ? bpf_test_timer_continue+0x147/0x410 [ 575.442160][T16773] bpf_test_run+0x310/0x9b0 [ 575.446666][T16773] ? convert___skb_to_skb+0x4f0/0x4f0 [ 575.452390][T16773] ? eth_get_headlen+0x1f0/0x1f0 [ 575.457704][T16773] ? convert___skb_to_skb+0x41/0x4f0 [ 575.462983][T16773] bpf_prog_test_run_skb+0x9c2/0x10b0 [ 575.468368][T16773] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 575.474425][T16773] bpf_prog_test_run+0x350/0x3c0 [ 575.479441][T16773] __se_sys_bpf+0x49f/0x680 [ 575.483933][T16773] ? __x64_sys_bpf+0x90/0x90 [ 575.488863][T16773] ? fpu__clear_all+0x20/0x20 [ 575.493791][T16773] __x64_sys_bpf+0x7b/0x90 [ 575.498316][T16773] do_syscall_64+0x31/0x40 [ 575.502815][T16773] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 575.508698][T16773] RIP: 0033:0x7f88498ee929 [ 575.514167][T16773] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 575.534102][T16773] RSP: 002b:00007f8847f57038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 575.542612][T16773] RAX: ffffffffffffffda RBX: 00007f8849b15fa0 RCX: 00007f88498ee929 [ 575.550579][T16773] RDX: 000000000000002c RSI: 0000200000000080 RDI: 000000000000000a [ 575.558827][T16773] RBP: 00007f8847f57090 R08: 0000000000000000 R09: 0000000000000000 [ 575.566955][T16773] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 575.574944][T16773] R13: 0000000000000000 R14: 00007f8849b15fa0 R15: 00007fffb35dea58 [ 575.866997][T16784] device pim6reg1 entered promiscuous mode [ 576.218744][T16803] device pim6reg1 entered promiscuous mode [ 576.700722][T16823] device pim6reg1 entered promiscuous mode [ 577.102535][T16832] device pim6reg1 entered promiscuous mode [ 577.302704][T16849] device pim6reg1 entered promiscuous mode [ 577.825805][T16870] device pim6reg1 entered promiscuous mode [ 578.006019][T16883] device pim6reg1 entered promiscuous mode [ 578.090242][T16885] device pim6reg1 entered promiscuous mode [ 578.457256][T16901] device pim6reg1 entered promiscuous mode [ 578.520856][T16907] device wg2 left promiscuous mode [ 578.606514][T16907] device wg2 entered promiscuous mode [ 578.620195][T16913] device pim6reg1 entered promiscuous mode [ 579.223087][T16939] device pim6reg1 entered promiscuous mode [ 579.331485][T16948] FAULT_INJECTION: forcing a failure. [ 579.331485][T16948] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 579.346717][T16951] device pim6reg1 entered promiscuous mode [ 579.347276][T16948] CPU: 1 PID: 16948 Comm: syz.3.5800 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 579.364399][T16948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 579.374637][T16948] Call Trace: [ 579.377937][T16948] __dump_stack+0x21/0x24 [ 579.382350][T16948] dump_stack_lvl+0x169/0x1d8 [ 579.387355][T16948] ? thaw_kernel_threads+0x220/0x220 [ 579.392685][T16948] ? show_regs_print_info+0x18/0x18 [ 579.397989][T16948] ? ppp_write+0xb6/0x370 [ 579.402325][T16948] dump_stack+0x15/0x1c [ 579.406668][T16948] should_fail+0x3c1/0x510 [ 579.411088][T16948] should_fail_usercopy+0x1a/0x20 [ 579.416299][T16948] _copy_from_user+0x20/0xd0 [ 579.421083][T16948] ppp_write+0x174/0x370 [ 579.425325][T16948] ? ppp_read+0x750/0x750 [ 579.429738][T16948] vfs_write+0x32d/0xd60 [ 579.434278][T16948] ? kernel_write+0x3c0/0x3c0 [ 579.439120][T16948] ? __fget_files+0x2c4/0x320 [ 579.443819][T16948] ? __fdget_pos+0x1f7/0x380 [ 579.448708][T16948] ? ksys_write+0x71/0x240 [ 579.453253][T16948] ksys_write+0x140/0x240 [ 579.457902][T16948] ? __ia32_sys_read+0x90/0x90 [ 579.462919][T16948] ? fpu__clear_all+0x20/0x20 [ 579.467677][T16948] __x64_sys_write+0x7b/0x90 [ 579.472283][T16948] do_syscall_64+0x31/0x40 [ 579.476845][T16948] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 579.482814][T16948] RIP: 0033:0x7f321ddd2929 [ 579.487440][T16948] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 579.507512][T16948] RSP: 002b:00007f321c43b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 579.516308][T16948] RAX: ffffffffffffffda RBX: 00007f321dff9fa0 RCX: 00007f321ddd2929 [ 579.524625][T16948] RDX: 0000000000000012 RSI: 00002000000002c0 RDI: 0000000000000003 [ 579.532946][T16948] RBP: 00007f321c43b090 R08: 0000000000000000 R09: 0000000000000000 [ 579.541630][T16948] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 579.550020][T16948] R13: 0000000000000000 R14: 00007f321dff9fa0 R15: 00007ffed3537c18 [ 580.168133][T16992] device pim6reg1 entered promiscuous mode [ 580.769978][T17026] device veth0_vlan left promiscuous mode [ 580.794771][T17026] device veth0_vlan entered promiscuous mode [ 580.845045][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 580.856642][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 580.873626][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 580.922875][T17031] device pim6reg1 entered promiscuous mode [ 581.393014][T17056] device pim6reg1 entered promiscuous mode [ 581.773651][T17071] device pim6reg1 entered promiscuous mode [ 581.888931][T17073] device pim6reg1 entered promiscuous mode [ 582.605208][T17087] syz.2.5857[17087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 582.605261][T17087] syz.2.5857[17087] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 582.674580][T17094] FAULT_INJECTION: forcing a failure. [ 582.674580][T17094] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 582.699448][T17094] CPU: 0 PID: 17094 Comm: syz.1.5859 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 582.712118][T17094] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 582.723596][T17094] Call Trace: [ 582.726905][T17094] __dump_stack+0x21/0x24 [ 582.731320][T17094] dump_stack_lvl+0x169/0x1d8 [ 582.736000][T17094] ? show_regs_print_info+0x18/0x18 [ 582.741281][T17094] dump_stack+0x15/0x1c [ 582.745432][T17094] should_fail+0x3c1/0x510 [ 582.750420][T17094] should_fail_usercopy+0x1a/0x20 [ 582.755471][T17094] _copy_from_iter+0x1d1/0x9f0 [ 582.760232][T17094] ? __kasan_check_read+0x11/0x20 [ 582.765436][T17094] ? __check_object_size+0x2f4/0x3c0 [ 582.770845][T17094] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 582.776710][T17094] ? _raw_spin_trylock_bh+0x130/0x130 [ 582.782081][T17094] ? skb_put+0x10e/0x1f0 [ 582.786363][T17094] unix_dgram_sendmsg+0x8d8/0x17d0 [ 582.791854][T17094] ? selinux_socket_accept+0x500/0x500 [ 582.797750][T17094] ? stack_trace_snprint+0xf0/0xf0 [ 582.802852][T17094] ? unix_dgram_poll+0x620/0x620 [ 582.807802][T17094] ? kasan_set_track+0x5b/0x70 [ 582.812580][T17094] ? kasan_set_track+0x4a/0x70 [ 582.818017][T17094] ? security_socket_sendmsg+0x82/0xa0 [ 582.823559][T17094] ? unix_dgram_poll+0x620/0x620 [ 582.828497][T17094] ____sys_sendmsg+0x5a2/0x8c0 [ 582.833261][T17094] ? __sys_sendmsg_sock+0x40/0x40 [ 582.838281][T17094] ? import_iovec+0x7c/0xb0 [ 582.842953][T17094] ___sys_sendmsg+0x1f0/0x260 [ 582.847711][T17094] ? __sys_sendmsg+0x250/0x250 [ 582.852466][T17094] ? rw_verify_area+0x1c0/0x360 [ 582.857407][T17094] ? __fdget+0x1a1/0x230 [ 582.862000][T17094] __x64_sys_sendmsg+0x1e2/0x2a0 [ 582.867104][T17094] ? fput+0x1a/0x20 [ 582.870909][T17094] ? ___sys_sendmsg+0x260/0x260 [ 582.875762][T17094] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 582.881824][T17094] do_syscall_64+0x31/0x40 [ 582.886435][T17094] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 582.892330][T17094] RIP: 0033:0x7f67f53e9929 [ 582.896915][T17094] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 582.916957][T17094] RSP: 002b:00007f67f3a52038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 582.925386][T17094] RAX: ffffffffffffffda RBX: 00007f67f5610fa0 RCX: 00007f67f53e9929 [ 582.933547][T17094] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000006 [ 582.941598][T17094] RBP: 00007f67f3a52090 R08: 0000000000000000 R09: 0000000000000000 [ 582.950232][T17094] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 582.958204][T17094] R13: 0000000000000000 R14: 00007f67f5610fa0 R15: 00007ffda6d6f088 [ 582.999336][T17100] device pim6reg1 entered promiscuous mode [ 583.197711][T17119] FAULT_INJECTION: forcing a failure. [ 583.197711][T17119] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 583.250605][T17119] CPU: 1 PID: 17119 Comm: syz.1.5870 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 583.262508][T17119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 583.273275][T17119] Call Trace: [ 583.276807][T17119] __dump_stack+0x21/0x24 [ 583.281276][T17119] dump_stack_lvl+0x169/0x1d8 [ 583.285954][T17119] ? thaw_kernel_threads+0x220/0x220 [ 583.291342][T17119] ? vsnprintf+0x1871/0x1960 [ 583.295952][T17119] ? show_regs_print_info+0x18/0x18 [ 583.301266][T17119] dump_stack+0x15/0x1c [ 583.306534][T17119] should_fail+0x3c1/0x510 [ 583.311120][T17119] should_fail_usercopy+0x1a/0x20 [ 583.316471][T17119] _copy_to_user+0x20/0x90 [ 583.321266][T17119] simple_read_from_buffer+0xe9/0x160 [ 583.327063][T17119] proc_fail_nth_read+0x19a/0x210 [ 583.332987][T17119] ? proc_fault_inject_write+0x2f0/0x2f0 [ 583.338656][T17119] ? rw_verify_area+0x1c0/0x360 [ 583.343605][T17119] ? proc_fault_inject_write+0x2f0/0x2f0 [ 583.349886][T17119] vfs_read+0x1fe/0xa10 [ 583.354346][T17119] ? kernel_read+0x70/0x70 [ 583.358858][T17119] ? __kasan_check_write+0x14/0x20 [ 583.364109][T17119] ? mutex_lock+0x8c/0xe0 [ 583.368456][T17119] ? mutex_trylock+0xa0/0xa0 [ 583.373049][T17119] ? __fget_files+0x2c4/0x320 [ 583.378283][T17119] ? __fdget_pos+0x2d2/0x380 [ 583.382927][T17119] ? ksys_read+0x71/0x240 [ 583.387262][T17119] ksys_read+0x140/0x240 [ 583.391507][T17119] ? vfs_write+0xd60/0xd60 [ 583.395926][T17119] __x64_sys_read+0x7b/0x90 [ 583.400731][T17119] do_syscall_64+0x31/0x40 [ 583.405337][T17119] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 583.411242][T17119] RIP: 0033:0x7f67f53e833c [ 583.415683][T17119] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 583.437439][T17119] RSP: 002b:00007f67f3a52030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 583.448536][T17119] RAX: ffffffffffffffda RBX: 00007f67f5610fa0 RCX: 00007f67f53e833c [ 583.457796][T17119] RDX: 000000000000000f RSI: 00007f67f3a520a0 RDI: 0000000000000003 [ 583.466336][T17119] RBP: 00007f67f3a52090 R08: 0000000000000000 R09: 0000000000000000 [ 583.474410][T17119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 583.482484][T17119] R13: 0000000000000001 R14: 00007f67f5610fa0 R15: 00007ffda6d6f088 [ 583.975251][T17129] device veth0_vlan left promiscuous mode [ 584.010151][T17129] device veth0_vlan entered promiscuous mode [ 584.279247][T17138] device pim6reg1 entered promiscuous mode [ 584.491361][T17141] device pim6reg1 entered promiscuous mode [ 585.033941][T17148] bridge0: port 1(bridge_slave_0) entered blocking state [ 585.045228][T17148] bridge0: port 1(bridge_slave_0) entered disabled state [ 585.054283][T17148] device bridge_slave_0 entered promiscuous mode [ 585.084747][T17148] bridge0: port 2(bridge_slave_1) entered blocking state [ 585.093304][T17148] bridge0: port 2(bridge_slave_1) entered disabled state [ 585.103460][T17148] device bridge_slave_1 entered promiscuous mode [ 585.264774][T17148] bridge0: port 2(bridge_slave_1) entered blocking state [ 585.272079][T17148] bridge0: port 2(bridge_slave_1) entered forwarding state [ 585.279615][T17148] bridge0: port 1(bridge_slave_0) entered blocking state [ 585.287692][T17148] bridge0: port 1(bridge_slave_0) entered forwarding state [ 585.408247][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 585.444373][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 585.490892][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 585.555989][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 585.605683][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 585.613097][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 585.624508][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 585.653592][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 585.660826][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 585.678046][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 585.692030][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 585.829815][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 585.838525][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 585.858508][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 585.866950][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 585.877743][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 585.886487][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 585.905175][T17148] device veth0_vlan entered promiscuous mode [ 585.936873][T17184] device pim6reg1 entered promiscuous mode [ 585.959870][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 585.971841][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 586.048675][T17148] device veth1_macvtap entered promiscuous mode [ 586.086837][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 586.095932][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 586.105024][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 586.114179][T17193] device pim6reg1 entered promiscuous mode [ 586.125745][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 586.135003][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 586.647447][ T955] device veth0_vlan left promiscuous mode [ 586.963688][T17219] device pim6reg1 entered promiscuous mode [ 587.333842][T17232] device sit0 entered promiscuous mode [ 587.512675][T17227] device pim6reg1 entered promiscuous mode [ 587.573416][T17237] device pim6reg1 entered promiscuous mode [ 587.895500][T17259] syz.2.5921[17259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 587.895600][T17259] syz.2.5921[17259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 588.224030][T17285] device pim6reg1 entered promiscuous mode [ 588.707778][T17310] device syzkaller0 entered promiscuous mode [ 588.873608][T17318] bridge0: port 1(bridge_slave_0) entered blocking state [ 588.881650][T17318] bridge0: port 1(bridge_slave_0) entered disabled state [ 588.889629][T17318] device bridge_slave_0 entered promiscuous mode [ 588.900603][T17320] device pim6reg1 entered promiscuous mode [ 588.910537][T17318] bridge0: port 2(bridge_slave_1) entered blocking state [ 588.918156][T17318] bridge0: port 2(bridge_slave_1) entered disabled state [ 588.925965][T17318] device bridge_slave_1 entered promiscuous mode [ 589.076277][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 589.084167][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 589.109158][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 589.120343][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 589.129841][ T7] bridge0: port 1(bridge_slave_0) entered blocking state [ 589.137293][ T7] bridge0: port 1(bridge_slave_0) entered forwarding state [ 589.146631][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 589.157786][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 589.166429][ T7] bridge0: port 2(bridge_slave_1) entered blocking state [ 589.173501][ T7] bridge0: port 2(bridge_slave_1) entered forwarding state [ 589.181439][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 589.190100][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 589.297961][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 589.450411][T17318] device veth0_vlan entered promiscuous mode [ 589.464168][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 589.473064][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 589.481782][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 589.494407][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 589.559732][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 589.571045][T17318] device veth1_macvtap entered promiscuous mode [ 589.653056][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 589.682560][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 589.727561][T17351] @0Ù: renamed from bond_slave_1 [ 589.750955][T17354] device pim6reg1 entered promiscuous mode [ 589.763165][T17351] device pim6reg1 entered promiscuous mode [ 589.894491][ T955] device veth1_macvtap left promiscuous mode [ 589.912285][ T955] device veth0_vlan left promiscuous mode [ 590.578674][T17389] device pim6reg1 entered promiscuous mode [ 590.822661][T17393] @0Ù: renamed from bond_slave_1 [ 590.853832][T17393] device pim6reg1 entered promiscuous mode [ 591.392136][T17406] bridge0: port 2(bridge_slave_1) entered disabled state [ 591.400459][T17406] bridge0: port 1(bridge_slave_0) entered disabled state [ 591.462373][T17416] device bridge_slave_1 left promiscuous mode [ 591.469100][T17416] bridge0: port 2(bridge_slave_1) entered disabled state [ 591.476883][T17416] device bridge_slave_0 left promiscuous mode [ 591.483241][T17416] bridge0: port 1(bridge_slave_0) entered disabled state [ 591.985315][T17429] device pim6reg1 entered promiscuous mode [ 592.474967][T17435] device wg2 entered promiscuous mode [ 593.122004][T17458] FAULT_INJECTION: forcing a failure. [ 593.122004][T17458] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 593.143878][T17458] CPU: 1 PID: 17458 Comm: syz.4.5994 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 593.156350][T17458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 593.166872][T17458] Call Trace: [ 593.170517][T17458] __dump_stack+0x21/0x24 [ 593.174857][T17458] dump_stack_lvl+0x169/0x1d8 [ 593.179540][T17458] ? show_regs_print_info+0x18/0x18 [ 593.185279][T17458] dump_stack+0x15/0x1c [ 593.189731][T17458] should_fail+0x3c1/0x510 [ 593.194645][T17458] should_fail_alloc_page+0x4f/0x60 [ 593.199858][T17458] __alloc_pages_nodemask+0x109/0x5f0 [ 593.205256][T17458] ? sched_clock+0x3a/0x40 [ 593.210253][T17458] ? sched_clock_cpu+0x1b/0x3d0 [ 593.215305][T17458] ? sched_clock+0x3a/0x40 [ 593.219851][T17458] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 593.225842][T17458] ? debug_smp_processor_id+0x17/0x20 [ 593.231703][T17458] ? __irq_exit_rcu+0x40/0x150 [ 593.236580][T17458] ? find_next_bit+0x80/0x100 [ 593.241559][T17458] pcpu_populate_chunk+0x184/0xca0 [ 593.247016][T17458] pcpu_alloc+0xb4c/0x16b0 [ 593.251743][T17458] __alloc_percpu_gfp+0x25/0x30 [ 593.257525][T17458] array_map_alloc+0x440/0x7c0 [ 593.262514][T17458] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 593.268763][T17458] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 593.274603][T17458] ? array_map_alloc_check+0x2c2/0x390 [ 593.280298][T17458] map_create+0x441/0x2190 [ 593.284767][T17458] __se_sys_bpf+0x203/0x680 [ 593.289573][T17458] ? __x64_sys_bpf+0x90/0x90 [ 593.294884][T17458] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 593.302433][T17458] __x64_sys_bpf+0x7b/0x90 [ 593.306906][T17458] do_syscall_64+0x31/0x40 [ 593.312314][T17458] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 593.318521][T17458] RIP: 0033:0x7f017dab6929 [ 593.323045][T17458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 593.343137][T17458] RSP: 002b:00007f017c11f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 593.351756][T17458] RAX: ffffffffffffffda RBX: 00007f017dcddfa0 RCX: 00007f017dab6929 [ 593.360005][T17458] RDX: 0000000000000048 RSI: 0000200000000140 RDI: 2000000000000000 [ 593.368444][T17458] RBP: 00007f017c11f090 R08: 0000000000000000 R09: 0000000000000000 [ 593.376863][T17458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 593.385540][T17458] R13: 0000000000000000 R14: 00007f017dcddfa0 R15: 00007fff36f86498 [ 593.479271][T17462] device pim6reg1 entered promiscuous mode [ 593.496185][T17466] syz.2.5998[17466] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 593.767331][T17476] FAULT_INJECTION: forcing a failure. [ 593.767331][T17476] name failslab, interval 1, probability 0, space 0, times 0 [ 593.826123][T17476] CPU: 0 PID: 17476 Comm: syz.1.6001 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 593.838056][T17476] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 593.848419][T17476] Call Trace: [ 593.851985][T17476] __dump_stack+0x21/0x24 [ 593.857048][T17476] dump_stack_lvl+0x169/0x1d8 [ 593.861742][T17476] ? thaw_kernel_threads+0x220/0x220 [ 593.867264][T17476] ? show_regs_print_info+0x18/0x18 [ 593.872472][T17476] dump_stack+0x15/0x1c [ 593.876728][T17476] should_fail+0x3c1/0x510 [ 593.881390][T17476] ? kvmalloc_node+0x88/0x130 [ 593.886357][T17476] __should_failslab+0xa4/0xe0 [ 593.891504][T17476] should_failslab+0x9/0x20 [ 593.896428][T17476] __kmalloc+0x60/0x330 [ 593.900598][T17476] ? btf_check_all_metas+0x747/0x820 [ 593.905894][T17476] ? kvmalloc_node+0x88/0x130 [ 593.910768][T17476] kvmalloc_node+0x88/0x130 [ 593.915365][T17476] btf_parse_type_sec+0x1b5/0x15a0 [ 593.920480][T17476] ? btf_check_sec_info+0x27a/0x330 [ 593.925695][T17476] ? btf_verifier_log+0x2a0/0x2a0 [ 593.931393][T17476] ? memcpy+0x56/0x70 [ 593.935496][T17476] ? btf_parse_hdr+0x5d6/0x7b0 [ 593.940284][T17476] ? btf_parse_str_sec+0x1aa/0x260 [ 593.945532][T17476] btf_new_fd+0x562/0xa00 [ 593.949988][T17476] bpf_btf_load+0x5e/0x70 [ 593.954616][T17476] __se_sys_bpf+0x48a/0x680 [ 593.959697][T17476] ? __x64_sys_bpf+0x90/0x90 [ 593.964408][T17476] ? fpu__clear_all+0x20/0x20 [ 593.969286][T17476] __x64_sys_bpf+0x7b/0x90 [ 593.973728][T17476] do_syscall_64+0x31/0x40 [ 593.978770][T17476] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 593.985110][T17476] RIP: 0033:0x7fb732017929 [ 593.989565][T17476] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 594.010203][T17476] RSP: 002b:00007fb730680038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 594.019309][T17476] RAX: ffffffffffffffda RBX: 00007fb73223efa0 RCX: 00007fb732017929 [ 594.027426][T17476] RDX: 0000000000000028 RSI: 0000200000001200 RDI: 0000000000000012 [ 594.035937][T17476] RBP: 00007fb730680090 R08: 0000000000000000 R09: 0000000000000000 [ 594.044252][T17476] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 594.052343][T17476] R13: 0000000000000000 R14: 00007fb73223efa0 R15: 00007ffec11ac168 [ 594.525814][T17508] FAULT_INJECTION: forcing a failure. [ 594.525814][T17508] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 594.622540][T17508] CPU: 1 PID: 17508 Comm: syz.2.6011 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 594.634098][T17508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 594.644336][T17508] Call Trace: [ 594.647664][T17508] __dump_stack+0x21/0x24 [ 594.652479][T17508] dump_stack_lvl+0x169/0x1d8 [ 594.657791][T17508] ? thaw_kernel_threads+0x220/0x220 [ 594.663193][T17508] ? show_regs_print_info+0x18/0x18 [ 594.668415][T17508] ? memcpy+0x56/0x70 [ 594.672411][T17508] dump_stack+0x15/0x1c [ 594.676664][T17508] should_fail+0x3c1/0x510 [ 594.681450][T17508] should_fail_usercopy+0x1a/0x20 [ 594.686943][T17508] _copy_to_user+0x20/0x90 [ 594.691656][T17508] bpf_verifier_vlog+0x1b4/0x330 [ 594.697070][T17508] __btf_verifier_log+0xd1/0x120 [ 594.702006][T17508] ? btf_check_sec_info+0x330/0x330 [ 594.707205][T17508] ? memcpy+0x56/0x70 [ 594.711183][T17508] btf_parse_hdr+0x3df/0x7b0 [ 594.715941][T17508] btf_new_fd+0x4af/0xa00 [ 594.720420][T17508] bpf_btf_load+0x5e/0x70 [ 594.725046][T17508] __se_sys_bpf+0x48a/0x680 [ 594.729541][T17508] ? __x64_sys_bpf+0x90/0x90 [ 594.734123][T17508] ? bpf_trace_run2+0xb8/0x200 [ 594.738975][T17508] __x64_sys_bpf+0x7b/0x90 [ 594.743483][T17508] do_syscall_64+0x31/0x40 [ 594.747907][T17508] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 594.753793][T17508] RIP: 0033:0x7f88498ee929 [ 594.758478][T17508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 594.778077][T17508] RSP: 002b:00007f8847f57038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 594.786507][T17508] RAX: ffffffffffffffda RBX: 00007f8849b15fa0 RCX: 00007f88498ee929 [ 594.794705][T17508] RDX: 0000000000000028 RSI: 0000200000000a40 RDI: 0000000000000012 [ 594.802817][T17508] RBP: 00007f8847f57090 R08: 0000000000000000 R09: 0000000000000000 [ 594.811149][T17508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 594.819308][T17508] R13: 0000000000000000 R14: 00007f8849b15fa0 R15: 00007fffb35dea58 [ 595.282427][T17536] device syzkaller0 entered promiscuous mode [ 595.495008][T17532] device pim6reg1 entered promiscuous mode [ 595.834243][T17542] FAULT_INJECTION: forcing a failure. [ 595.834243][T17542] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 595.863839][T17542] CPU: 0 PID: 17542 Comm: syz.2.6023 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 595.875303][T17542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 595.885910][T17542] Call Trace: [ 595.889315][T17542] __dump_stack+0x21/0x24 [ 595.893752][T17542] dump_stack_lvl+0x169/0x1d8 [ 595.898524][T17542] ? show_regs_print_info+0x18/0x18 [ 595.903760][T17542] dump_stack+0x15/0x1c [ 595.908041][T17542] should_fail+0x3c1/0x510 [ 595.912500][T17542] should_fail_usercopy+0x1a/0x20 [ 595.917687][T17542] _copy_from_iter+0x1d1/0x9f0 [ 595.922473][T17542] ? __kasan_check_read+0x11/0x20 [ 595.927562][T17542] ? __check_object_size+0x2f4/0x3c0 [ 595.933474][T17542] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 595.940437][T17542] tun_get_user+0x140a/0x3090 [ 595.945782][T17542] ? __x64_sys_openat+0x136/0x160 [ 595.951577][T17542] ? tun_do_read+0x1c00/0x1c00 [ 595.956881][T17542] ? kstrtouint_from_user+0x1a0/0x200 [ 595.962284][T17542] ? __fsnotify_parent+0x5f5/0x6c0 [ 595.967763][T17542] ? avc_policy_seqno+0x1b/0x70 [ 595.973398][T17542] ? selinux_file_permission+0x2a5/0x510 [ 595.979440][T17542] ? fsnotify_perm+0x66/0x4b0 [ 595.984963][T17542] tun_chr_write_iter+0x1bf/0x270 [ 595.990227][T17542] vfs_write+0x725/0xd60 [ 595.994796][T17542] ? __kasan_slab_free+0x11/0x20 [ 595.999937][T17542] ? kernel_write+0x3c0/0x3c0 [ 596.004871][T17542] ? __fget_files+0x2c4/0x320 [ 596.010190][T17542] ? __fdget_pos+0x1f7/0x380 [ 596.014803][T17542] ? ksys_write+0x71/0x240 [ 596.019261][T17542] ksys_write+0x140/0x240 [ 596.023608][T17542] ? __ia32_sys_read+0x90/0x90 [ 596.028383][T17542] ? fpu__clear_all+0x20/0x20 [ 596.033072][T17542] __x64_sys_write+0x7b/0x90 [ 596.037673][T17542] do_syscall_64+0x31/0x40 [ 596.042102][T17542] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 596.048008][T17542] RIP: 0033:0x7f88498ee929 [ 596.052530][T17542] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 596.072657][T17542] RSP: 002b:00007f8847f57038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 596.081402][T17542] RAX: ffffffffffffffda RBX: 00007f8849b15fa0 RCX: 00007f88498ee929 [ 596.089549][T17542] RDX: 000000000000ffbf RSI: 0000200000000580 RDI: 0000000000000003 [ 596.098688][T17542] RBP: 00007f8847f57090 R08: 0000000000000000 R09: 0000000000000000 [ 596.106944][T17542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 596.115190][T17542] R13: 0000000000000000 R14: 00007f8849b15fa0 R15: 00007fffb35dea58 [ 596.167324][T17550] device syzkaller0 entered promiscuous mode [ 596.223131][T17540] bridge0: port 1(bridge_slave_0) entered blocking state [ 596.230590][T17540] bridge0: port 1(bridge_slave_0) entered disabled state [ 596.238459][T17540] device bridge_slave_0 entered promiscuous mode [ 596.254052][T17540] bridge0: port 2(bridge_slave_1) entered blocking state [ 596.265171][T17540] bridge0: port 2(bridge_slave_1) entered disabled state [ 596.278254][T17540] device bridge_slave_1 entered promiscuous mode [ 596.589543][T17570] device pim6reg1 entered promiscuous mode [ 597.313782][T17580] device syzkaller0 entered promiscuous mode [ 597.370678][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 597.379040][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 597.395408][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 597.404706][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 597.413227][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 597.420330][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 597.428439][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 597.438042][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 597.448120][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 597.455551][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 597.489349][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 597.503088][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 597.521506][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 597.542549][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 597.551643][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 597.571965][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 597.580752][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 597.589012][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 597.597978][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 597.607858][T17540] device veth0_vlan entered promiscuous mode [ 597.670037][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 597.686605][T17540] device veth1_macvtap entered promiscuous mode [ 597.717621][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 597.732740][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 597.757330][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 597.774267][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 597.831427][T17611] device syzkaller0 entered promiscuous mode [ 597.846337][T17609] device wg2 entered promiscuous mode [ 597.913557][T17617] @0Ù: renamed from bond_slave_1 [ 598.113905][T17618] device pim6reg1 entered promiscuous mode [ 598.446211][ T955] device bridge_slave_1 left promiscuous mode [ 598.464439][ T955] bridge0: port 2(bridge_slave_1) entered disabled state [ 598.487385][ T955] device bridge_slave_0 left promiscuous mode [ 598.514628][ T955] bridge0: port 1(bridge_slave_0) entered disabled state [ 598.549235][ T955] device veth0_vlan left promiscuous mode [ 598.660268][T17670] device pim6reg1 entered promiscuous mode [ 598.796015][T17682] FAULT_INJECTION: forcing a failure. [ 598.796015][T17682] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 598.809671][T17682] CPU: 0 PID: 17682 Comm: syz.1.6068 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 598.821254][T17682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 598.831323][T17682] Call Trace: [ 598.834629][T17682] __dump_stack+0x21/0x24 [ 598.838966][T17682] dump_stack_lvl+0x169/0x1d8 [ 598.843963][T17682] ? thaw_kernel_threads+0x220/0x220 [ 598.849624][T17682] ? vsnprintf+0x1871/0x1960 [ 598.854229][T17682] ? show_regs_print_info+0x18/0x18 [ 598.859433][T17682] dump_stack+0x15/0x1c [ 598.863681][T17682] should_fail+0x3c1/0x510 [ 598.868186][T17682] should_fail_usercopy+0x1a/0x20 [ 598.873212][T17682] _copy_to_user+0x20/0x90 [ 598.877734][T17682] simple_read_from_buffer+0xe9/0x160 [ 598.883139][T17682] proc_fail_nth_read+0x19a/0x210 [ 598.888601][T17682] ? proc_fault_inject_write+0x2f0/0x2f0 [ 598.894240][T17682] ? rw_verify_area+0x1c0/0x360 [ 598.899697][T17682] ? proc_fault_inject_write+0x2f0/0x2f0 [ 598.905515][T17682] vfs_read+0x1fe/0xa10 [ 598.909679][T17682] ? kernel_read+0x70/0x70 [ 598.914185][T17682] ? __kasan_check_write+0x14/0x20 [ 598.919469][T17682] ? mutex_lock+0x8c/0xe0 [ 598.924507][T17682] ? mutex_trylock+0xa0/0xa0 [ 598.929492][T17682] ? __fget_files+0x2c4/0x320 [ 598.934794][T17682] ? __fdget_pos+0x2d2/0x380 [ 598.940111][T17682] ? ksys_read+0x71/0x240 [ 598.944726][T17682] ksys_read+0x140/0x240 [ 598.949561][T17682] ? vfs_write+0xd60/0xd60 [ 598.954040][T17682] ? fpu__clear_all+0x20/0x20 [ 598.958741][T17682] __x64_sys_read+0x7b/0x90 [ 598.963522][T17682] do_syscall_64+0x31/0x40 [ 598.968160][T17682] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 598.974158][T17682] RIP: 0033:0x7fb73201633c [ 598.978773][T17682] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 598.999882][T17682] RSP: 002b:00007fb730680030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 599.008504][T17682] RAX: ffffffffffffffda RBX: 00007fb73223efa0 RCX: 00007fb73201633c [ 599.017115][T17682] RDX: 000000000000000f RSI: 00007fb7306800a0 RDI: 0000000000000006 [ 599.025135][T17682] RBP: 00007fb730680090 R08: 0000000000000000 R09: 0000000000000000 [ 599.033932][T17682] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 599.042094][T17682] R13: 0000000000000000 R14: 00007fb73223efa0 R15: 00007ffec11ac168 [ 599.219275][T17693] FAULT_INJECTION: forcing a failure. [ 599.219275][T17693] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 599.267062][T17693] CPU: 0 PID: 17693 Comm: syz.2.6072 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 599.279080][T17693] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 599.289704][T17693] Call Trace: [ 599.293127][T17693] __dump_stack+0x21/0x24 [ 599.297471][T17693] dump_stack_lvl+0x169/0x1d8 [ 599.302168][T17693] ? thaw_kernel_threads+0x220/0x220 [ 599.307781][T17693] ? vsnprintf+0x1871/0x1960 [ 599.312719][T17693] ? show_regs_print_info+0x18/0x18 [ 599.317950][T17693] dump_stack+0x15/0x1c [ 599.322210][T17693] should_fail+0x3c1/0x510 [ 599.326651][T17693] should_fail_usercopy+0x1a/0x20 [ 599.331722][T17693] _copy_to_user+0x20/0x90 [ 599.336381][T17693] simple_read_from_buffer+0xe9/0x160 [ 599.341770][T17693] proc_fail_nth_read+0x19a/0x210 [ 599.346980][T17693] ? proc_fault_inject_write+0x2f0/0x2f0 [ 599.352611][T17693] ? rw_verify_area+0x1c0/0x360 [ 599.357571][T17693] ? proc_fault_inject_write+0x2f0/0x2f0 [ 599.363203][T17693] vfs_read+0x1fe/0xa10 [ 599.367442][T17693] ? kernel_read+0x70/0x70 [ 599.371855][T17693] ? _raw_spin_unlock+0x4d/0x70 [ 599.376968][T17693] ? __kasan_check_write+0x14/0x20 [ 599.382074][T17693] ? mutex_lock+0x8c/0xe0 [ 599.386392][T17693] ? mutex_trylock+0xa0/0xa0 [ 599.390970][T17693] ? __fget_files+0x2c4/0x320 [ 599.395645][T17693] ? __fdget_pos+0x2d2/0x380 [ 599.400230][T17693] ? ksys_read+0x71/0x240 [ 599.404549][T17693] ksys_read+0x140/0x240 [ 599.408782][T17693] ? vfs_write+0xd60/0xd60 [ 599.413193][T17693] ? fpu__clear_all+0x20/0x20 [ 599.417863][T17693] __x64_sys_read+0x7b/0x90 [ 599.422365][T17693] do_syscall_64+0x31/0x40 [ 599.426780][T17693] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 599.432670][T17693] RIP: 0033:0x7f88498ed33c [ 599.437281][T17693] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 599.457140][T17693] RSP: 002b:00007f8847f57030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 599.465636][T17693] RAX: ffffffffffffffda RBX: 00007f8849b15fa0 RCX: 00007f88498ed33c [ 599.473605][T17693] RDX: 000000000000000f RSI: 00007f8847f570a0 RDI: 0000000000000005 [ 599.481970][T17693] RBP: 00007f8847f57090 R08: 0000000000000000 R09: 0000000000000000 [ 599.490035][T17693] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 599.498003][T17693] R13: 0000000000000000 R14: 00007f8849b15fa0 R15: 00007fffb35dea58 [ 599.542007][T17697] device sit0 entered promiscuous mode [ 599.577421][ T24] audit: type=1400 audit(1750200647.720:156): avc: denied { create } for pid=17694 comm="syz.0.6073" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 600.054085][T17712] device pim6reg1 entered promiscuous mode [ 600.716457][T17744] device pim6reg1 entered promiscuous mode [ 600.834057][T17746] device veth1_macvtap left promiscuous mode [ 600.840703][T17746] device macsec0 left promiscuous mode [ 601.266525][T17770] FAULT_INJECTION: forcing a failure. [ 601.266525][T17770] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 601.291836][T17770] CPU: 0 PID: 17770 Comm: syz.4.6100 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 601.303515][T17770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 601.313830][T17770] Call Trace: [ 601.317216][T17770] __dump_stack+0x21/0x24 [ 601.321664][T17770] dump_stack_lvl+0x169/0x1d8 [ 601.326339][T17770] ? thaw_kernel_threads+0x220/0x220 [ 601.331837][T17770] ? show_regs_print_info+0x18/0x18 [ 601.337058][T17770] ? memcpy+0x56/0x70 [ 601.341037][T17770] dump_stack+0x15/0x1c [ 601.345276][T17770] should_fail+0x3c1/0x510 [ 601.349707][T17770] should_fail_usercopy+0x1a/0x20 [ 601.354969][T17770] _copy_to_user+0x20/0x90 [ 601.359738][T17770] bpf_verifier_vlog+0x1b4/0x330 [ 601.364675][T17770] __btf_verifier_log+0xd1/0x120 [ 601.370130][T17770] ? btf_check_sec_info+0x330/0x330 [ 601.375673][T17770] ? memcpy+0x56/0x70 [ 601.379652][T17770] btf_parse_hdr+0x3df/0x7b0 [ 601.384249][T17770] btf_new_fd+0x4af/0xa00 [ 601.388780][T17770] bpf_btf_load+0x5e/0x70 [ 601.393102][T17770] __se_sys_bpf+0x48a/0x680 [ 601.397783][T17770] ? __x64_sys_bpf+0x90/0x90 [ 601.402486][T17770] ? fpu__clear_all+0x20/0x20 [ 601.407595][T17770] __x64_sys_bpf+0x7b/0x90 [ 601.412293][T17770] do_syscall_64+0x31/0x40 [ 601.416706][T17770] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 601.422591][T17770] RIP: 0033:0x7f017dab6929 [ 601.427009][T17770] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 601.449324][T17770] RSP: 002b:00007f017c11f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 601.458128][T17770] RAX: ffffffffffffffda RBX: 00007f017dcddfa0 RCX: 00007f017dab6929 [ 601.466190][T17770] RDX: 0000000000000020 RSI: 00002000000001c0 RDI: 0000000000000012 [ 601.474247][T17770] RBP: 00007f017c11f090 R08: 0000000000000000 R09: 0000000000000000 [ 601.482301][T17770] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 601.490457][T17770] R13: 0000000000000000 R14: 00007f017dcddfa0 R15: 00007fff36f86498 [ 601.774831][T17795] device pim6reg1 entered promiscuous mode [ 601.972730][T17148] cgroup: fork rejected by pids controller in /syz4 [ 602.364151][T17823] device veth1_macvtap left promiscuous mode [ 602.403729][T17823] device veth1_macvtap entered promiscuous mode [ 602.415323][T17823] device macsec0 entered promiscuous mode [ 602.422749][T17828] FAULT_INJECTION: forcing a failure. [ 602.422749][T17828] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 602.454007][T17823] FAULT_INJECTION: forcing a failure. [ 602.454007][T17823] name failslab, interval 1, probability 0, space 0, times 0 [ 602.473854][T17828] CPU: 0 PID: 17828 Comm: syz.3.6122 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 602.485689][T17828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 602.496364][T17828] Call Trace: [ 602.499850][T17828] __dump_stack+0x21/0x24 [ 602.504500][T17828] dump_stack_lvl+0x169/0x1d8 [ 602.509259][T17828] ? show_regs_print_info+0x18/0x18 [ 602.514476][T17828] dump_stack+0x15/0x1c [ 602.518630][T17828] should_fail+0x3c1/0x510 [ 602.523233][T17828] should_fail_alloc_page+0x4f/0x60 [ 602.528427][T17828] __alloc_pages_nodemask+0x109/0x5f0 [ 602.534004][T17828] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 602.539609][T17828] ? __kmalloc_track_caller+0x1d7/0x320 [ 602.545166][T17828] ? kasan_unpoison+0x67/0x90 [ 602.549955][T17828] ? __kasan_check_write+0x14/0x20 [ 602.555071][T17828] ? __alloc_skb+0x38b/0x520 [ 602.559765][T17828] alloc_skb_with_frags+0x1bc/0x560 [ 602.564991][T17828] sock_alloc_send_pskb+0x853/0x980 [ 602.570746][T17828] ? sock_kzfree_s+0x60/0x60 [ 602.575433][T17828] ? __kasan_check_write+0x14/0x20 [ 602.580550][T17828] ? _raw_spin_lock+0x8e/0xe0 [ 602.585407][T17828] ? _raw_spin_trylock_bh+0x130/0x130 [ 602.590874][T17828] ? security_socket_getpeersec_dgram+0x93/0xb0 [ 602.597337][T17828] unix_dgram_sendmsg+0x5f4/0x17d0 [ 602.602476][T17828] ? selinux_socket_accept+0x500/0x500 [ 602.608145][T17828] ? stack_trace_snprint+0xf0/0xf0 [ 602.613435][T17828] ? unix_dgram_poll+0x620/0x620 [ 602.618463][T17828] ? kasan_set_track+0x5b/0x70 [ 602.623226][T17828] ? kasan_set_track+0x4a/0x70 [ 602.628203][T17828] ? security_socket_sendmsg+0x82/0xa0 [ 602.634145][T17828] ? unix_dgram_poll+0x620/0x620 [ 602.639180][T17828] ____sys_sendmsg+0x5a2/0x8c0 [ 602.644277][T17828] ? __sys_sendmsg_sock+0x40/0x40 [ 602.649327][T17828] ? import_iovec+0x7c/0xb0 [ 602.653861][T17828] ___sys_sendmsg+0x1f0/0x260 [ 602.658611][T17828] ? __sys_sendmsg+0x250/0x250 [ 602.663700][T17828] ? rw_verify_area+0x1c0/0x360 [ 602.668602][T17828] ? __fdget+0x1a1/0x230 [ 602.673115][T17828] __x64_sys_sendmsg+0x1e2/0x2a0 [ 602.678270][T17828] ? fput+0x1a/0x20 [ 602.682099][T17828] ? ___sys_sendmsg+0x260/0x260 [ 602.687431][T17828] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 602.693510][T17828] do_syscall_64+0x31/0x40 [ 602.697980][T17828] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 602.703876][T17828] RIP: 0033:0x7fc040aeb929 [ 602.708505][T17828] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 602.728490][T17828] RSP: 002b:00007fc03f154038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 602.737098][T17828] RAX: ffffffffffffffda RBX: 00007fc040d12fa0 RCX: 00007fc040aeb929 [ 602.745342][T17828] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000006 [ 602.753713][T17828] RBP: 00007fc03f154090 R08: 0000000000000000 R09: 0000000000000000 [ 602.762094][T17828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 602.770282][T17828] R13: 0000000000000000 R14: 00007fc040d12fa0 R15: 00007ffe103a5258 [ 602.785637][T17823] CPU: 0 PID: 17823 Comm: syz.1.6121 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 602.798003][T17823] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 602.808247][T17823] Call Trace: [ 602.811646][T17823] __dump_stack+0x21/0x24 [ 602.816113][T17823] dump_stack_lvl+0x169/0x1d8 [ 602.820802][T17823] ? thaw_kernel_threads+0x220/0x220 [ 602.826091][T17823] ? show_regs_print_info+0x18/0x18 [ 602.831389][T17823] ? finish_task_switch+0x12e/0x5a0 [ 602.836598][T17823] ? switch_mm_irqs_off+0x30c/0x9a0 [ 602.841795][T17823] dump_stack+0x15/0x1c [ 602.846039][T17823] should_fail+0x3c1/0x510 [ 602.850457][T17823] ? ____ip_mc_inc_group+0x190/0x820 [ 602.855742][T17823] __should_failslab+0xa4/0xe0 [ 602.860507][T17823] should_failslab+0x9/0x20 [ 602.865009][T17823] kmem_cache_alloc_trace+0x3a/0x2e0 [ 602.870503][T17823] ____ip_mc_inc_group+0x190/0x820 [ 602.875765][T17823] ? preempt_schedule_notrace+0x110/0x110 [ 602.881691][T17823] ip_mc_up+0x112/0x1f0 [ 602.886033][T17823] inetdev_event+0xc13/0x1030 [ 602.890871][T17823] ? devinet_exit_net+0x220/0x220 [ 602.895990][T17823] raw_notifier_call_chain+0x90/0x100 [ 602.901622][T17823] __dev_notify_flags+0x28f/0x500 [ 602.907045][T17823] ? __dev_change_flags+0x6a0/0x6a0 [ 602.912249][T17823] ? __dev_change_flags+0x513/0x6a0 [ 602.917574][T17823] ? dev_get_flags+0x1e0/0x1e0 [ 602.922391][T17823] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 602.929937][T17823] dev_change_flags+0xe8/0x1a0 [ 602.934830][T17823] dev_ifsioc+0x113/0xa50 [ 602.939525][T17823] ? dev_ioctl+0xb80/0xb80 [ 602.943980][T17823] dev_ioctl+0x550/0xb80 [ 602.948842][T17823] sock_do_ioctl+0x235/0x330 [ 602.954340][T17823] ? __kasan_slab_free+0x11/0x20 [ 602.959486][T17823] ? sock_show_fdinfo+0xa0/0xa0 [ 602.964530][T17823] ? selinux_file_ioctl+0x377/0x480 [ 602.969736][T17823] ? mutex_trylock+0xa0/0xa0 [ 602.974542][T17823] ? __fget_files+0x2c4/0x320 [ 602.979613][T17823] sock_ioctl+0x504/0x710 [ 602.984326][T17823] ? sock_poll+0x360/0x360 [ 602.988902][T17823] ? __fget_files+0x2c4/0x320 [ 602.994293][T17823] ? security_file_ioctl+0x84/0xa0 [ 602.999531][T17823] ? sock_poll+0x360/0x360 [ 603.004239][T17823] __se_sys_ioctl+0x121/0x1a0 [ 603.009192][T17823] __x64_sys_ioctl+0x7b/0x90 [ 603.013794][T17823] do_syscall_64+0x31/0x40 [ 603.018387][T17823] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 603.024293][T17823] RIP: 0033:0x7fb732017929 [ 603.028720][T17823] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 603.048940][T17823] RSP: 002b:00007fb730680038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 603.057681][T17823] RAX: ffffffffffffffda RBX: 00007fb73223efa0 RCX: 00007fb732017929 [ 603.065960][T17823] RDX: 0000200000000080 RSI: 0000000000008914 RDI: 0000000000000008 [ 603.074025][T17823] RBP: 00007fb730680090 R08: 0000000000000000 R09: 0000000000000000 [ 603.082001][T17823] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 603.090337][T17823] R13: 0000000000000000 R14: 00007fb73223efa0 R15: 00007ffec11ac168 [ 603.110925][T17832] syz.2.6123 uses obsolete (PF_INET,SOCK_PACKET) [ 603.146181][T17816] bridge0: port 1(bridge_slave_0) entered blocking state [ 603.153566][T17816] bridge0: port 1(bridge_slave_0) entered disabled state [ 603.169333][T17816] device bridge_slave_0 entered promiscuous mode [ 603.191551][T17840] FAULT_INJECTION: forcing a failure. [ 603.191551][T17840] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 603.205820][T17840] CPU: 0 PID: 17840 Comm: syz.2.6127 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 603.211741][T17836] device pim6reg1 entered promiscuous mode [ 603.217573][T17840] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 603.217579][T17840] Call Trace: [ 603.217606][T17840] __dump_stack+0x21/0x24 [ 603.217616][T17840] dump_stack_lvl+0x169/0x1d8 [ 603.217630][T17840] ? thaw_kernel_threads+0x220/0x220 [ 603.217641][T17840] ? show_regs_print_info+0x18/0x18 [ 603.217655][T17840] dump_stack+0x15/0x1c [ 603.217668][T17840] should_fail+0x3c1/0x510 [ 603.217680][T17840] should_fail_usercopy+0x1a/0x20 [ 603.217691][T17840] copy_page_from_iter+0x381/0x6c0 [ 603.217705][T17840] skb_copy_datagram_from_iter+0x2d0/0x6b0 [ 603.217719][T17840] unix_dgram_sendmsg+0x8d8/0x17d0 [ 603.217742][T17840] ? selinux_socket_accept+0x500/0x500 [ 603.292765][T17840] ? stack_trace_snprint+0xf0/0xf0 [ 603.298126][T17840] ? unix_dgram_poll+0x620/0x620 [ 603.303098][T17840] ? kasan_set_track+0x5b/0x70 [ 603.307875][T17840] ? kasan_set_track+0x4a/0x70 [ 603.312644][T17840] ? security_socket_sendmsg+0x82/0xa0 [ 603.318273][T17840] ? unix_dgram_poll+0x620/0x620 [ 603.323228][T17840] ____sys_sendmsg+0x5a2/0x8c0 [ 603.328005][T17840] ? __sys_sendmsg_sock+0x40/0x40 [ 603.333042][T17840] ? import_iovec+0x7c/0xb0 [ 603.337558][T17840] ___sys_sendmsg+0x1f0/0x260 [ 603.342614][T17840] ? __sys_sendmsg+0x250/0x250 [ 603.347559][T17840] ? rw_verify_area+0x1c0/0x360 [ 603.352418][T17840] ? __fdget+0x1a1/0x230 [ 603.356751][T17840] __x64_sys_sendmsg+0x1e2/0x2a0 [ 603.361722][T17840] ? fput+0x1a/0x20 [ 603.365539][T17840] ? ___sys_sendmsg+0x260/0x260 [ 603.371023][T17840] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 603.377107][T17840] do_syscall_64+0x31/0x40 [ 603.381888][T17840] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 603.388257][T17840] RIP: 0033:0x7f88498ee929 [ 603.392785][T17840] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 603.412791][T17840] RSP: 002b:00007f8847f57038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 603.421481][T17840] RAX: ffffffffffffffda RBX: 00007f8849b15fa0 RCX: 00007f88498ee929 [ 603.429839][T17840] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000007 [ 603.438389][T17840] RBP: 00007f8847f57090 R08: 0000000000000000 R09: 0000000000000000 [ 603.447000][T17840] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 603.456124][T17840] R13: 0000000000000000 R14: 00007f8849b15fa0 R15: 00007fffb35dea58 [ 603.483610][T17816] bridge0: port 2(bridge_slave_1) entered blocking state [ 603.492435][T17816] bridge0: port 2(bridge_slave_1) entered disabled state [ 603.501104][T17816] device bridge_slave_1 entered promiscuous mode [ 603.657777][ T955] device veth1_macvtap left promiscuous mode [ 603.674269][ T955] device veth0_vlan left promiscuous mode [ 603.869610][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 603.900716][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 604.036392][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 604.100301][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 604.136814][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 604.144173][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 604.164311][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 604.173150][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 604.181891][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 604.189383][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 604.197492][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 604.207357][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 604.216145][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 604.289617][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 604.326488][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 604.411816][T17888] device pim6reg1 entered promiscuous mode [ 604.418904][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 604.428433][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 604.450170][T17816] device veth0_vlan entered promiscuous mode [ 604.531285][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 604.554147][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 604.570879][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 604.579404][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 604.676281][T17892] FAULT_INJECTION: forcing a failure. [ 604.676281][T17892] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 604.698459][T17816] device veth1_macvtap entered promiscuous mode [ 604.728785][T17892] CPU: 0 PID: 17892 Comm: syz.0.6146 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 604.740754][T17892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 604.751298][T17892] Call Trace: [ 604.754617][T17892] __dump_stack+0x21/0x24 [ 604.759319][T17892] dump_stack_lvl+0x169/0x1d8 [ 604.764039][T17892] ? show_regs_print_info+0x18/0x18 [ 604.769339][T17892] ? stack_trace_save+0x98/0xe0 [ 604.774338][T17892] dump_stack+0x15/0x1c [ 604.778545][T17892] should_fail+0x3c1/0x510 [ 604.783524][T17892] should_fail_usercopy+0x1a/0x20 [ 604.789343][T17892] _copy_from_user+0x20/0xd0 [ 604.794089][T17892] __copy_msghdr_from_user+0xaf/0x5e0 [ 604.799658][T17892] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 604.804967][T17892] ? __fsnotify_parent+0x5f5/0x6c0 [ 604.810186][T17892] ___sys_sendmsg+0x156/0x260 [ 604.814914][T17892] ? __sys_sendmsg+0x250/0x250 [ 604.819962][T17892] ? rw_verify_area+0x1c0/0x360 [ 604.825101][T17892] ? __fdget+0x1a1/0x230 [ 604.829444][T17892] __x64_sys_sendmsg+0x1e2/0x2a0 [ 604.834388][T17892] ? fput+0x1a/0x20 [ 604.838452][T17892] ? ___sys_sendmsg+0x260/0x260 [ 604.843411][T17892] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 604.849507][T17892] do_syscall_64+0x31/0x40 [ 604.854388][T17892] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 604.860595][T17892] RIP: 0033:0x7f07f6f37929 [ 604.866482][T17892] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 604.886506][T17892] RSP: 002b:00007f07f55a0038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 604.894958][T17892] RAX: ffffffffffffffda RBX: 00007f07f715efa0 RCX: 00007f07f6f37929 [ 604.903116][T17892] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000004 [ 604.911185][T17892] RBP: 00007f07f55a0090 R08: 0000000000000000 R09: 0000000000000000 [ 604.919257][T17892] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 604.927756][T17892] R13: 0000000000000000 R14: 00007f07f715efa0 R15: 00007ffe4c70d2a8 [ 604.941930][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 604.960212][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 605.000731][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 605.038661][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 605.053579][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 605.347277][T17915] device pim6reg1 entered promiscuous mode [ 605.430422][T17920] bridge0: port 1(bridge_slave_0) entered blocking state [ 605.472648][T17920] bridge0: port 1(bridge_slave_0) entered disabled state [ 605.480709][T17920] device bridge_slave_0 entered promiscuous mode [ 605.490590][T17920] bridge0: port 2(bridge_slave_1) entered blocking state [ 605.497973][T17920] bridge0: port 2(bridge_slave_1) entered disabled state [ 605.506152][T17920] device bridge_slave_1 entered promiscuous mode [ 605.560940][T17920] bridge0: port 2(bridge_slave_1) entered blocking state [ 605.568194][T17920] bridge0: port 2(bridge_slave_1) entered forwarding state [ 605.575612][T17920] bridge0: port 1(bridge_slave_0) entered blocking state [ 605.583011][T17920] bridge0: port 1(bridge_slave_0) entered forwarding state [ 605.629115][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 605.640486][ T9] bridge0: port 1(bridge_slave_0) entered disabled state [ 605.651906][ T9] bridge0: port 2(bridge_slave_1) entered disabled state [ 605.678935][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 605.688406][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 605.695688][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 605.703427][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 605.713135][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 605.721645][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 605.739681][T17925] device pim6reg1 entered promiscuous mode [ 605.761932][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 605.770500][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 605.812139][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 605.825663][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 605.891476][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 605.944453][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 606.615403][ T955] device veth1_macvtap left promiscuous mode [ 606.621494][ T955] device veth0_vlan left promiscuous mode [ 610.434804][T17920] device veth0_vlan entered promiscuous mode [ 610.474435][T17946] device sit0 entered promiscuous mode [ 610.488765][ T955] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 610.514485][ T955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 610.568861][T17920] device veth1_macvtap entered promiscuous mode [ 610.687999][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 610.744883][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 610.814457][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 610.860064][T17955] device pim6reg1 entered promiscuous mode [ 610.881707][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 610.894415][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 611.441567][ T24] audit: type=1400 audit(1750200659.580:157): avc: denied { create } for pid=17973 comm="syz.3.6171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 611.616428][T17971] bridge0: port 1(bridge_slave_0) entered blocking state [ 611.636393][T17971] bridge0: port 1(bridge_slave_0) entered disabled state [ 611.673232][T17971] device bridge_slave_0 entered promiscuous mode [ 611.818394][T17971] bridge0: port 2(bridge_slave_1) entered blocking state [ 611.851219][T17971] bridge0: port 2(bridge_slave_1) entered disabled state [ 611.891804][T17971] device bridge_slave_1 entered promiscuous mode [ 612.628291][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 612.646634][ T301] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 612.674904][T18005] device wg2 entered promiscuous mode [ 612.782255][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 612.804598][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 612.836201][ T9] bridge0: port 1(bridge_slave_0) entered blocking state [ 612.843362][ T9] bridge0: port 1(bridge_slave_0) entered forwarding state [ 612.863968][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 612.883080][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 612.900144][ T9] bridge0: port 2(bridge_slave_1) entered blocking state [ 612.907345][ T9] bridge0: port 2(bridge_slave_1) entered forwarding state [ 612.928522][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 612.937857][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 612.946688][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 612.955424][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 612.964211][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 613.126891][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 613.144294][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 613.240101][T17971] device veth0_vlan entered promiscuous mode [ 613.248703][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 613.258008][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 613.357447][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 613.367152][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 613.384475][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 613.399462][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 613.430061][T17971] device veth1_macvtap entered promiscuous mode [ 613.472685][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 613.481636][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 613.491319][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 613.558061][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 613.574249][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 614.397342][T18022] device syzkaller0 entered promiscuous mode [ 615.303240][T18052] device syzkaller0 entered promiscuous mode [ 615.907835][T18071] device pim6reg1 entered promiscuous mode [ 617.441856][T18093] device sit0 left promiscuous mode [ 617.895534][T18109] device pim6reg1 entered promiscuous mode [ 617.934578][ T24] audit: type=1400 audit(1750200666.070:158): avc: denied { create } for pid=18110 comm="syz.0.6215" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 618.615907][T18137] FAULT_INJECTION: forcing a failure. [ 618.615907][T18137] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 618.630464][T18137] CPU: 1 PID: 18137 Comm: syz.4.6223 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 618.641957][T18137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 618.652447][T18137] Call Trace: [ 618.655749][T18137] __dump_stack+0x21/0x24 [ 618.660163][T18137] dump_stack_lvl+0x169/0x1d8 [ 618.664834][T18137] ? thaw_kernel_threads+0x220/0x220 [ 618.670330][T18137] ? show_regs_print_info+0x18/0x18 [ 618.675536][T18137] ? memcpy+0x56/0x70 [ 618.679635][T18137] dump_stack+0x15/0x1c [ 618.683981][T18137] should_fail+0x3c1/0x510 [ 618.688491][T18137] should_fail_usercopy+0x1a/0x20 [ 618.693623][T18137] _copy_to_user+0x20/0x90 [ 618.698225][T18137] bpf_verifier_vlog+0x1b4/0x330 [ 618.703154][T18137] __btf_verifier_log+0xd1/0x120 [ 618.708082][T18137] ? btf_check_sec_info+0x330/0x330 [ 618.713362][T18137] ? unwind_get_return_address+0x4d/0x90 [ 618.719160][T18137] ? stack_trace_save+0xe0/0xe0 [ 618.724209][T18137] __btf_verifier_log_type+0x4a0/0x610 [ 618.729700][T18137] ? btf_int_show+0x2bf0/0x2bf0 [ 618.734726][T18137] btf_enum_check_meta+0x43a/0xa90 [ 618.740093][T18137] btf_check_all_metas+0x230/0x820 [ 618.745568][T18137] ? __btf_verifier_log+0x120/0x120 [ 618.750762][T18137] btf_parse_type_sec+0xea/0x15a0 [ 618.756048][T18137] ? btf_check_sec_info+0x27a/0x330 [ 618.761347][T18137] ? btf_check_sec_info+0x330/0x330 [ 618.766636][T18137] ? btf_verifier_log+0x2a0/0x2a0 [ 618.771654][T18137] ? memcpy+0x56/0x70 [ 618.776078][T18137] ? btf_parse_hdr+0x5d6/0x7b0 [ 618.780906][T18137] ? btf_parse_str_sec+0x1aa/0x260 [ 618.786314][T18137] btf_new_fd+0x562/0xa00 [ 618.790878][T18137] bpf_btf_load+0x5e/0x70 [ 618.795204][T18137] __se_sys_bpf+0x48a/0x680 [ 618.799704][T18137] ? __x64_sys_bpf+0x90/0x90 [ 618.804300][T18137] ? fpu__clear_all+0x20/0x20 [ 618.809170][T18137] __x64_sys_bpf+0x7b/0x90 [ 618.813936][T18137] do_syscall_64+0x31/0x40 [ 618.818635][T18137] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 618.824723][T18137] RIP: 0033:0x7fbf14d83929 [ 618.829139][T18137] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 618.849360][T18137] RSP: 002b:00007fbf133ec038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 618.857945][T18137] RAX: ffffffffffffffda RBX: 00007fbf14faafa0 RCX: 00007fbf14d83929 [ 618.866175][T18137] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 0000000000000012 [ 618.874510][T18137] RBP: 00007fbf133ec090 R08: 0000000000000000 R09: 0000000000000000 [ 618.882632][T18137] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 618.890982][T18137] R13: 0000000000000000 R14: 00007fbf14faafa0 R15: 00007fff52596a98 [ 619.148109][T18153] device pim6reg1 entered promiscuous mode [ 619.722444][T18181] FAULT_INJECTION: forcing a failure. [ 619.722444][T18181] name failslab, interval 1, probability 0, space 0, times 0 [ 619.723989][T18183] syz.3.6240[18183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 619.744647][T18183] syz.3.6240[18183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 619.764085][T18181] CPU: 1 PID: 18181 Comm: syz.0.6239 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 619.787443][T18181] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 619.797949][T18181] Call Trace: [ 619.801360][T18181] __dump_stack+0x21/0x24 [ 619.805912][T18181] dump_stack_lvl+0x169/0x1d8 [ 619.810594][T18181] ? thaw_kernel_threads+0x220/0x220 [ 619.816433][T18181] ? show_regs_print_info+0x18/0x18 [ 619.821923][T18181] ? timerqueue_add+0x20a/0x230 [ 619.826794][T18181] dump_stack+0x15/0x1c [ 619.830961][T18181] should_fail+0x3c1/0x510 [ 619.835464][T18181] ? getname_flags+0xb9/0x500 [ 619.840227][T18181] __should_failslab+0xa4/0xe0 [ 619.845103][T18181] should_failslab+0x9/0x20 [ 619.849640][T18181] kmem_cache_alloc+0x3d/0x2e0 [ 619.854396][T18181] ? clockevents_program_event+0x362/0x8b0 [ 619.860463][T18181] getname_flags+0xb9/0x500 [ 619.864973][T18181] getname+0x19/0x20 [ 619.868864][T18181] do_sys_openat2+0xd9/0x6d0 [ 619.873450][T18181] ? hrtimer_interrupt+0x5c2/0xdc0 [ 619.878661][T18181] ? do_sys_open+0xe0/0xe0 [ 619.883075][T18181] ? kvm_sched_clock_read+0x18/0x40 [ 619.888448][T18181] ? sched_clock+0x3a/0x40 [ 619.892887][T18181] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 619.898961][T18181] __x64_sys_openat+0x136/0x160 [ 619.903862][T18181] do_syscall_64+0x31/0x40 [ 619.908417][T18181] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 619.914301][T18181] RIP: 0033:0x7ff970b26929 [ 619.918985][T18181] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 619.938971][T18181] RSP: 002b:00007ff96f18f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 619.947646][T18181] RAX: ffffffffffffffda RBX: 00007ff970d4dfa0 RCX: 00007ff970b26929 [ 619.955710][T18181] RDX: 0000000000200002 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 619.963784][T18181] RBP: 00007ff96f18f090 R08: 0000000000000000 R09: 0000000000000000 [ 619.971748][T18181] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 619.979714][T18181] R13: 0000000000000000 R14: 00007ff970d4dfa0 R15: 00007ffe2c6634e8 [ 620.026700][T18179] device veth0_vlan left promiscuous mode [ 620.073552][T18179] device veth0_vlan entered promiscuous mode [ 620.139292][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 620.165971][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 620.204306][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 620.214106][T18193] @0Ù: renamed from bond_slave_1 [ 620.276447][T18193] device pim6reg1 entered promiscuous mode [ 623.308696][T18251] device pim6reg1 entered promiscuous mode [ 624.912076][T18274] FAULT_INJECTION: forcing a failure. [ 624.912076][T18274] name failslab, interval 1, probability 0, space 0, times 0 [ 624.925184][T18274] CPU: 0 PID: 18274 Comm: syz.0.6272 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 624.937369][T18274] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 624.947642][T18274] Call Trace: [ 624.951640][T18274] __dump_stack+0x21/0x24 [ 624.956225][T18274] dump_stack_lvl+0x169/0x1d8 [ 624.961210][T18274] ? show_regs_print_info+0x18/0x18 [ 624.966666][T18274] ? __btf_verifier_log_type+0x4a0/0x610 [ 624.972419][T18274] dump_stack+0x15/0x1c [ 624.976654][T18274] should_fail+0x3c1/0x510 [ 624.981342][T18274] ? kvmalloc_node+0x88/0x130 [ 624.986024][T18274] __should_failslab+0xa4/0xe0 [ 624.991397][T18274] should_failslab+0x9/0x20 [ 624.996168][T18274] __kmalloc+0x60/0x330 [ 625.000545][T18274] kvmalloc_node+0x88/0x130 [ 625.005098][T18274] btf_check_all_metas+0x347/0x820 [ 625.010344][T18274] btf_parse_type_sec+0xea/0x15a0 [ 625.015457][T18274] ? btf_check_sec_info+0x27a/0x330 [ 625.020656][T18274] ? btf_check_sec_info+0x330/0x330 [ 625.025961][T18274] ? btf_verifier_log+0x2a0/0x2a0 [ 625.031009][T18274] ? memcpy+0x56/0x70 [ 625.034987][T18274] ? btf_parse_hdr+0x5d6/0x7b0 [ 625.039903][T18274] ? btf_parse_str_sec+0x1aa/0x260 [ 625.045224][T18274] btf_new_fd+0x562/0xa00 [ 625.049580][T18274] bpf_btf_load+0x5e/0x70 [ 625.053911][T18274] __se_sys_bpf+0x48a/0x680 [ 625.058409][T18274] ? __x64_sys_bpf+0x90/0x90 [ 625.063007][T18274] __x64_sys_bpf+0x7b/0x90 [ 625.067414][T18274] do_syscall_64+0x31/0x40 [ 625.071826][T18274] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 625.077707][T18274] RIP: 0033:0x7ff970b26929 [ 625.082114][T18274] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 625.101853][T18274] RSP: 002b:00007ff96f18f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 625.110256][T18274] RAX: ffffffffffffffda RBX: 00007ff970d4dfa0 RCX: 00007ff970b26929 [ 625.118220][T18274] RDX: 0000000000000028 RSI: 0000200000000280 RDI: 0000000000000012 [ 625.126354][T18274] RBP: 00007ff96f18f090 R08: 0000000000000000 R09: 0000000000000000 [ 625.134316][T18274] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 625.142285][T18274] R13: 0000000000000001 R14: 00007ff970d4dfa0 R15: 00007ffe2c6634e8 [ 625.189633][T18284] device pim6reg1 entered promiscuous mode [ 632.659250][T18318] device pim6reg1 entered promiscuous mode [ 632.808536][T18330] device pim6reg1 entered promiscuous mode [ 633.983243][T18374] device pim6reg1 entered promiscuous mode [ 635.397551][T18402] device pim6reg1 entered promiscuous mode [ 635.988371][T18436] FAULT_INJECTION: forcing a failure. [ 635.988371][T18436] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 636.032873][T18436] CPU: 0 PID: 18436 Comm: syz.3.6334 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 636.044435][T18436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 636.054541][T18436] Call Trace: [ 636.057849][T18436] __dump_stack+0x21/0x24 [ 636.062209][T18436] dump_stack_lvl+0x169/0x1d8 [ 636.066980][T18436] ? thaw_kernel_threads+0x220/0x220 [ 636.072266][T18436] ? vsnprintf+0x1871/0x1960 [ 636.076860][T18436] ? show_regs_print_info+0x18/0x18 [ 636.082060][T18436] dump_stack+0x15/0x1c [ 636.086405][T18436] should_fail+0x3c1/0x510 [ 636.090823][T18436] should_fail_usercopy+0x1a/0x20 [ 636.096115][T18436] _copy_to_user+0x20/0x90 [ 636.100627][T18436] simple_read_from_buffer+0xe9/0x160 [ 636.106008][T18436] proc_fail_nth_read+0x19a/0x210 [ 636.111037][T18436] ? proc_fault_inject_write+0x2f0/0x2f0 [ 636.116670][T18436] ? rw_verify_area+0x1c0/0x360 [ 636.121975][T18436] ? proc_fault_inject_write+0x2f0/0x2f0 [ 636.127702][T18436] vfs_read+0x1fe/0xa10 [ 636.132372][T18436] ? kernel_read+0x70/0x70 [ 636.136814][T18436] ? __kasan_check_write+0x14/0x20 [ 636.141940][T18436] ? mutex_lock+0x8c/0xe0 [ 636.146287][T18436] ? mutex_trylock+0xa0/0xa0 [ 636.150885][T18436] ? __fget_files+0x2c4/0x320 [ 636.155577][T18436] ? __fdget_pos+0x2d2/0x380 [ 636.160206][T18436] ? ksys_read+0x71/0x240 [ 636.164714][T18436] ksys_read+0x140/0x240 [ 636.169060][T18436] ? vfs_write+0xd60/0xd60 [ 636.173569][T18436] ? fpu__clear_all+0x20/0x20 [ 636.178337][T18436] __x64_sys_read+0x7b/0x90 [ 636.182935][T18436] do_syscall_64+0x31/0x40 [ 636.187363][T18436] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 636.193260][T18436] RIP: 0033:0x7fc040aea33c [ 636.197883][T18436] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 636.217826][T18436] RSP: 002b:00007fc03f154030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 636.226677][T18436] RAX: ffffffffffffffda RBX: 00007fc040d12fa0 RCX: 00007fc040aea33c [ 636.234875][T18436] RDX: 000000000000000f RSI: 00007fc03f1540a0 RDI: 0000000000000004 [ 636.242956][T18436] RBP: 00007fc03f154090 R08: 0000000000000000 R09: 0000000000000000 [ 636.251024][T18436] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 636.259015][T18436] R13: 0000000000000000 R14: 00007fc040d12fa0 R15: 00007ffe103a5258 [ 636.559786][T18443] device veth1_macvtap left promiscuous mode [ 636.570457][T18443] device macsec0 entered promiscuous mode [ 636.852685][T18465] syz.0.6346[18465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 636.852786][T18465] syz.0.6346[18465] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 636.941506][T18471] device pim6reg1 entered promiscuous mode [ 637.405801][T18492] FAULT_INJECTION: forcing a failure. [ 637.405801][T18492] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 637.423784][T18492] CPU: 1 PID: 18492 Comm: syz.2.6355 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 637.435295][T18492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 637.445974][T18492] Call Trace: [ 637.449310][T18492] __dump_stack+0x21/0x24 [ 637.453768][T18492] dump_stack_lvl+0x169/0x1d8 [ 637.458464][T18492] ? thaw_kernel_threads+0x220/0x220 [ 637.463858][T18492] ? show_regs_print_info+0x18/0x18 [ 637.469186][T18492] dump_stack+0x15/0x1c [ 637.473362][T18492] should_fail+0x3c1/0x510 [ 637.477986][T18492] should_fail_usercopy+0x1a/0x20 [ 637.483286][T18492] copy_page_from_iter+0x381/0x6c0 [ 637.488398][T18492] skb_copy_datagram_from_iter+0x2d0/0x6b0 [ 637.494434][T18492] unix_dgram_sendmsg+0x8d8/0x17d0 [ 637.499718][T18492] ? selinux_socket_accept+0x500/0x500 [ 637.505303][T18492] ? stack_trace_snprint+0xf0/0xf0 [ 637.510497][T18492] ? unix_dgram_poll+0x620/0x620 [ 637.515431][T18492] ? kasan_set_track+0x5b/0x70 [ 637.520182][T18492] ? kasan_set_track+0x4a/0x70 [ 637.525035][T18492] ? security_socket_sendmsg+0x82/0xa0 [ 637.530669][T18492] ? unix_dgram_poll+0x620/0x620 [ 637.535601][T18492] ____sys_sendmsg+0x5a2/0x8c0 [ 637.540369][T18492] ? __sys_sendmsg_sock+0x40/0x40 [ 637.545486][T18492] ? import_iovec+0x7c/0xb0 [ 637.549985][T18492] ___sys_sendmsg+0x1f0/0x260 [ 637.554746][T18492] ? __sys_sendmsg+0x250/0x250 [ 637.559547][T18492] ? rw_verify_area+0x1c0/0x360 [ 637.564504][T18492] ? __fdget+0x1a1/0x230 [ 637.568845][T18492] __x64_sys_sendmsg+0x1e2/0x2a0 [ 637.573874][T18492] ? fput+0x1a/0x20 [ 637.577956][T18492] ? ___sys_sendmsg+0x260/0x260 [ 637.582997][T18492] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 637.589597][T18492] do_syscall_64+0x31/0x40 [ 637.594398][T18492] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 637.600377][T18492] RIP: 0033:0x7f142f79d929 [ 637.604984][T18492] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 637.625113][T18492] RSP: 002b:00007f142de06038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 637.633542][T18492] RAX: ffffffffffffffda RBX: 00007f142f9c4fa0 RCX: 00007f142f79d929 [ 637.641694][T18492] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000006 [ 637.649690][T18492] RBP: 00007f142de06090 R08: 0000000000000000 R09: 0000000000000000 [ 637.657795][T18492] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 637.666150][T18492] R13: 0000000000000000 R14: 00007f142f9c4fa0 R15: 00007ffe6ed34968 [ 637.778982][T18498] device veth1_macvtap left promiscuous mode [ 637.814931][T18498] device syzkaller0 entered promiscuous mode [ 637.882442][T18504] @0Ù: renamed from bond_slave_1 [ 637.897169][T18504] device pim6reg1 entered promiscuous mode [ 638.762542][T18544] device syzkaller0 entered promiscuous mode [ 639.483203][T18573] device pim6reg1 entered promiscuous mode [ 640.295493][T18588] device wg2 left promiscuous mode [ 640.308467][T18591] device wg2 entered promiscuous mode [ 640.379944][T18593] ÿ: renamed from bond_slave_0 [ 641.480298][T18645] FAULT_INJECTION: forcing a failure. [ 641.480298][T18645] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 641.505149][T18645] CPU: 0 PID: 18645 Comm: syz.0.6414 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 641.516544][T18645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 641.526689][T18645] Call Trace: [ 641.529968][T18645] __dump_stack+0x21/0x24 [ 641.534275][T18645] dump_stack_lvl+0x169/0x1d8 [ 641.538930][T18645] ? show_regs_print_info+0x18/0x18 [ 641.544118][T18645] dump_stack+0x15/0x1c [ 641.548273][T18645] should_fail+0x3c1/0x510 [ 641.552693][T18645] should_fail_alloc_page+0x4f/0x60 [ 641.557887][T18645] __alloc_pages_nodemask+0x109/0x5f0 [ 641.563257][T18645] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 641.568836][T18645] ? find_next_bit+0x80/0x100 [ 641.573520][T18645] pcpu_populate_chunk+0x184/0xca0 [ 641.578641][T18645] pcpu_alloc+0xb4c/0x16b0 [ 641.583170][T18645] __alloc_percpu_gfp+0x25/0x30 [ 641.588073][T18645] array_map_alloc+0x440/0x7c0 [ 641.592944][T18645] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 641.598577][T18645] ? kernel_write+0x3c0/0x3c0 [ 641.603257][T18645] ? array_map_alloc_check+0x2c2/0x390 [ 641.608732][T18645] map_create+0x441/0x2190 [ 641.613183][T18645] __se_sys_bpf+0x203/0x680 [ 641.617693][T18645] ? __x64_sys_bpf+0x90/0x90 [ 641.622290][T18645] ? fpu__clear_all+0x20/0x20 [ 641.626992][T18645] __x64_sys_bpf+0x7b/0x90 [ 641.631552][T18645] do_syscall_64+0x31/0x40 [ 641.636416][T18645] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 641.642313][T18645] RIP: 0033:0x7ff970b26929 [ 641.646823][T18645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 641.666816][T18645] RSP: 002b:00007ff96f18f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 641.675248][T18645] RAX: ffffffffffffffda RBX: 00007ff970d4dfa0 RCX: 00007ff970b26929 [ 641.683322][T18645] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 2000000000000000 [ 641.691588][T18645] RBP: 00007ff96f18f090 R08: 0000000000000000 R09: 0000000000000000 [ 641.699662][T18645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 641.708597][T18645] R13: 0000000000000000 R14: 00007ff970d4dfa0 R15: 00007ffe2c6634e8 [ 643.245383][T18720] bridge0: port 2(bridge_slave_1) entered disabled state [ 643.254161][T18720] bridge0: port 1(bridge_slave_0) entered disabled state [ 644.139561][T18761] FAULT_INJECTION: forcing a failure. [ 644.139561][T18761] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 644.180732][T18761] CPU: 0 PID: 18761 Comm: syz.4.6454 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 644.192442][T18761] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 644.202660][T18761] Call Trace: [ 644.205999][T18761] __dump_stack+0x21/0x24 [ 644.210450][T18761] dump_stack_lvl+0x169/0x1d8 [ 644.215334][T18761] ? show_regs_print_info+0x18/0x18 [ 644.220560][T18761] dump_stack+0x15/0x1c [ 644.224744][T18761] should_fail+0x3c1/0x510 [ 644.229198][T18761] should_fail_alloc_page+0x4f/0x60 [ 644.234442][T18761] __alloc_pages_nodemask+0x109/0x5f0 [ 644.239840][T18761] ? sched_clock+0x3a/0x40 [ 644.244454][T18761] ? sched_clock+0x3a/0x40 [ 644.248893][T18761] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 644.254454][T18761] ? irqentry_nmi_enter+0x10/0x30 [ 644.259796][T18761] ? __irq_exit_rcu+0x40/0x150 [ 644.264584][T18761] ? find_next_bit+0x80/0x100 [ 644.269296][T18761] pcpu_populate_chunk+0x184/0xca0 [ 644.274617][T18761] pcpu_alloc+0xb4c/0x16b0 [ 644.279063][T18761] __alloc_percpu_gfp+0x25/0x30 [ 644.284117][T18761] array_map_alloc+0x440/0x7c0 [ 644.289185][T18761] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 644.295081][T18761] ? array_map_alloc_check+0x2c2/0x390 [ 644.300572][T18761] map_create+0x441/0x2190 [ 644.305303][T18761] __se_sys_bpf+0x203/0x680 [ 644.310022][T18761] ? __x64_sys_bpf+0x90/0x90 [ 644.314688][T18761] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 644.320951][T18761] __x64_sys_bpf+0x7b/0x90 [ 644.325501][T18761] do_syscall_64+0x31/0x40 [ 644.329937][T18761] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 644.335840][T18761] RIP: 0033:0x7fbf14d83929 [ 644.340282][T18761] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 644.360000][T18761] RSP: 002b:00007fbf133ec038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 644.368453][T18761] RAX: ffffffffffffffda RBX: 00007fbf14faafa0 RCX: 00007fbf14d83929 [ 644.376575][T18761] RDX: 0000000000000048 RSI: 0000200000000140 RDI: 2000000000000000 [ 644.385086][T18761] RBP: 00007fbf133ec090 R08: 0000000000000000 R09: 0000000000000000 [ 644.393094][T18761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 644.401270][T18761] R13: 0000000000000000 R14: 00007fbf14faafa0 R15: 00007fff52596a98 [ 644.729107][T18776] device sit0 entered promiscuous mode [ 644.863807][T18778] Â: renamed from pim6reg1 [ 645.045359][T18786] syz.2.6462[18786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 645.045459][T18786] syz.2.6462[18786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 645.059807][T18786] device pim6reg1 entered promiscuous mode [ 646.015706][T18804] bridge0: port 2(bridge_slave_1) entered disabled state [ 646.023013][T18804] bridge0: port 1(bridge_slave_0) entered disabled state [ 646.060268][T18811] bridge0: port 2(bridge_slave_1) entered disabled state [ 646.067907][T18811] bridge0: port 1(bridge_slave_0) entered disabled state [ 650.101089][T18937] device syzkaller0 entered promiscuous mode [ 651.034025][T18973] FAULT_INJECTION: forcing a failure. [ 651.034025][T18973] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 651.081922][T18973] CPU: 1 PID: 18973 Comm: syz.2.6527 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 651.094084][T18973] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 651.104155][T18973] Call Trace: [ 651.107502][T18973] __dump_stack+0x21/0x24 [ 651.111840][T18973] dump_stack_lvl+0x169/0x1d8 [ 651.116984][T18973] ? thaw_kernel_threads+0x220/0x220 [ 651.122410][T18973] ? show_regs_print_info+0x18/0x18 [ 651.127657][T18973] ? memcpy+0x56/0x70 [ 651.131663][T18973] dump_stack+0x15/0x1c [ 651.136039][T18973] should_fail+0x3c1/0x510 [ 651.140466][T18973] should_fail_usercopy+0x1a/0x20 [ 651.145508][T18973] _copy_to_user+0x20/0x90 [ 651.150135][T18973] bpf_verifier_vlog+0x1b4/0x330 [ 651.155264][T18973] __btf_verifier_log+0xd1/0x120 [ 651.160312][T18973] ? btf_check_sec_info+0x330/0x330 [ 651.165813][T18973] ? memcpy+0x56/0x70 [ 651.169930][T18973] btf_parse_hdr+0x40a/0x7b0 [ 651.174700][T18973] btf_new_fd+0x4af/0xa00 [ 651.179058][T18973] bpf_btf_load+0x5e/0x70 [ 651.183751][T18973] __se_sys_bpf+0x48a/0x680 [ 651.188437][T18973] ? __x64_sys_bpf+0x90/0x90 [ 651.193294][T18973] __x64_sys_bpf+0x7b/0x90 [ 651.197710][T18973] do_syscall_64+0x31/0x40 [ 651.202138][T18973] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 651.208039][T18973] RIP: 0033:0x7f142f79d929 [ 651.212624][T18973] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 651.233280][T18973] RSP: 002b:00007f142de06038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 651.242166][T18973] RAX: ffffffffffffffda RBX: 00007f142f9c4fa0 RCX: 00007f142f79d929 [ 651.250150][T18973] RDX: 0000000000000020 RSI: 00002000000001c0 RDI: 0000000000000012 [ 651.258131][T18973] RBP: 00007f142de06090 R08: 0000000000000000 R09: 0000000000000000 [ 651.266107][T18973] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 651.274172][T18973] R13: 0000000000000000 R14: 00007f142f9c4fa0 R15: 00007ffe6ed34968 [ 652.252849][T19012] FAULT_INJECTION: forcing a failure. [ 652.252849][T19012] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 652.267145][T19012] CPU: 0 PID: 19012 Comm: syz.0.6544 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 652.278734][T19012] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 652.289036][T19012] Call Trace: [ 652.292351][T19012] __dump_stack+0x21/0x24 [ 652.297317][T19012] dump_stack_lvl+0x169/0x1d8 [ 652.302063][T19012] ? show_regs_print_info+0x18/0x18 [ 652.307458][T19012] dump_stack+0x15/0x1c [ 652.311886][T19012] should_fail+0x3c1/0x510 [ 652.316345][T19012] should_fail_usercopy+0x1a/0x20 [ 652.321536][T19012] _copy_from_iter+0x1d1/0x9f0 [ 652.326466][T19012] ? __check_object_size+0x2f4/0x3c0 [ 652.331833][T19012] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 652.337717][T19012] ? __napi_alloc_skb+0x169/0x2e0 [ 652.342739][T19012] tun_get_user+0x140a/0x3090 [ 652.347607][T19012] ? tun_do_read+0x1c00/0x1c00 [ 652.352366][T19012] ? kstrtouint_from_user+0x1a0/0x200 [ 652.358000][T19012] ? __fsnotify_parent+0x5f5/0x6c0 [ 652.363104][T19012] ? avc_policy_seqno+0x1b/0x70 [ 652.368255][T19012] ? selinux_file_permission+0x2a5/0x510 [ 652.373886][T19012] ? fsnotify_perm+0x66/0x4b0 [ 652.378568][T19012] tun_chr_write_iter+0x1bf/0x270 [ 652.383715][T19012] vfs_write+0x725/0xd60 [ 652.388040][T19012] ? __bpf_trace_kmem_free+0x6f/0x90 [ 652.393697][T19012] ? kernel_write+0x3c0/0x3c0 [ 652.398578][T19012] ? __fget_files+0x2c4/0x320 [ 652.403254][T19012] ? __fdget_pos+0x1f7/0x380 [ 652.408039][T19012] ? ksys_write+0x71/0x240 [ 652.412720][T19012] ksys_write+0x140/0x240 [ 652.417204][T19012] ? __ia32_sys_read+0x90/0x90 [ 652.421974][T19012] ? __bpf_trace_sys_enter+0x62/0x70 [ 652.427282][T19012] __x64_sys_write+0x7b/0x90 [ 652.432354][T19012] do_syscall_64+0x31/0x40 [ 652.436872][T19012] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 652.443552][T19012] RIP: 0033:0x7ff970b26929 [ 652.447965][T19012] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 652.468229][T19012] RSP: 002b:00007ff96f18f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 652.477010][T19012] RAX: ffffffffffffffda RBX: 00007ff970d4dfa0 RCX: 00007ff970b26929 [ 652.485428][T19012] RDX: 0000000000000066 RSI: 0000000000000000 RDI: 0000000000000003 [ 652.494511][T19012] RBP: 00007ff96f18f090 R08: 0000000000000000 R09: 0000000000000000 [ 652.503259][T19012] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 652.511540][T19012] R13: 0000000000000000 R14: 00007ff970d4dfa0 R15: 00007ffe2c6634e8 [ 652.619877][T19018] FAULT_INJECTION: forcing a failure. [ 652.619877][T19018] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 652.641397][T19018] CPU: 0 PID: 19018 Comm: syz.3.6547 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 652.652900][T19018] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 652.663079][T19018] Call Trace: [ 652.666685][T19018] __dump_stack+0x21/0x24 [ 652.671032][T19018] dump_stack_lvl+0x169/0x1d8 [ 652.675804][T19018] ? show_regs_print_info+0x18/0x18 [ 652.681086][T19018] dump_stack+0x15/0x1c [ 652.685243][T19018] should_fail+0x3c1/0x510 [ 652.689751][T19018] should_fail_alloc_page+0x4f/0x60 [ 652.694999][T19018] __alloc_pages_nodemask+0x109/0x5f0 [ 652.700859][T19018] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 652.707082][T19018] ? _raw_spin_trylock_bh+0x130/0x130 [ 652.712502][T19018] ? debug_smp_processor_id+0x17/0x20 [ 652.717893][T19018] __get_free_pages+0xe/0x30 [ 652.722494][T19018] kasan_populate_vmalloc_pte+0x29/0x120 [ 652.728342][T19018] __apply_to_page_range+0x74e/0x9e0 [ 652.733633][T19018] ? kasan_populate_vmalloc+0x70/0x70 [ 652.739086][T19018] ? kasan_populate_vmalloc+0x70/0x70 [ 652.744552][T19018] apply_to_page_range+0x3b/0x50 [ 652.749744][T19018] kasan_populate_vmalloc+0x60/0x70 [ 652.754940][T19018] alloc_vmap_area+0x1734/0x1870 [ 652.759960][T19018] ? vm_map_ram+0x9c0/0x9c0 [ 652.765051][T19018] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 652.770627][T19018] ? __get_vm_area_node+0x113/0x450 [ 652.775920][T19018] __get_vm_area_node+0x147/0x450 [ 652.781681][T19018] __vmalloc_node_range+0xe0/0x780 [ 652.787551][T19018] ? htab_map_alloc+0x4b6/0x970 [ 652.792978][T19018] bpf_map_area_alloc+0xd5/0xe0 [ 652.797930][T19018] ? htab_map_alloc+0x4b6/0x970 [ 652.802870][T19018] htab_map_alloc+0x4b6/0x970 [ 652.807736][T19018] map_create+0x441/0x2190 [ 652.812273][T19018] __se_sys_bpf+0x203/0x680 [ 652.816767][T19018] ? __x64_sys_bpf+0x90/0x90 [ 652.821449][T19018] ? debug_smp_processor_id+0x17/0x20 [ 652.826998][T19018] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 652.833412][T19018] __x64_sys_bpf+0x7b/0x90 [ 652.837831][T19018] do_syscall_64+0x31/0x40 [ 652.842243][T19018] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 652.848293][T19018] RIP: 0033:0x7fc040aeb929 [ 652.853113][T19018] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 652.873680][T19018] RSP: 002b:00007fc03f154038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 652.882092][T19018] RAX: ffffffffffffffda RBX: 00007fc040d12fa0 RCX: 00007fc040aeb929 [ 652.890144][T19018] RDX: 0000000000000048 RSI: 00002000000002c0 RDI: 0000000000000000 [ 652.898271][T19018] RBP: 00007fc03f154090 R08: 0000000000000000 R09: 0000000000000000 [ 652.906264][T19018] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 652.914367][T19018] R13: 0000000000000000 R14: 00007fc040d12fa0 R15: 00007ffe103a5258 [ 653.041119][T19031] syz.1.6552[19031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 653.041224][T19031] syz.1.6552[19031] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 653.693429][T19071] FAULT_INJECTION: forcing a failure. [ 653.693429][T19071] name failslab, interval 1, probability 0, space 0, times 0 [ 653.723900][T19074] device pim6reg1 entered promiscuous mode [ 653.803876][T19071] CPU: 0 PID: 19071 Comm: syz.0.6567 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 653.815888][T19071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 653.826762][T19071] Call Trace: [ 653.830245][T19071] __dump_stack+0x21/0x24 [ 653.834667][T19071] dump_stack_lvl+0x169/0x1d8 [ 653.839535][T19071] ? thaw_kernel_threads+0x220/0x220 [ 653.845173][T19071] ? show_regs_print_info+0x18/0x18 [ 653.850691][T19071] dump_stack+0x15/0x1c [ 653.854936][T19071] should_fail+0x3c1/0x510 [ 653.859555][T19071] ? __alloc_skb+0x9e/0x520 [ 653.864060][T19071] __should_failslab+0xa4/0xe0 [ 653.868928][T19071] should_failslab+0x9/0x20 [ 653.873432][T19071] kmem_cache_alloc+0x3d/0x2e0 [ 653.878634][T19071] __alloc_skb+0x9e/0x520 [ 653.882970][T19071] alloc_skb_with_frags+0xa2/0x560 [ 653.888089][T19071] sock_alloc_send_pskb+0x853/0x980 [ 653.893289][T19071] ? is_bpf_text_address+0x177/0x190 [ 653.898785][T19071] ? __kernel_text_address+0xa0/0x100 [ 653.904158][T19071] ? sock_kzfree_s+0x60/0x60 [ 653.908752][T19071] ? stack_trace_save+0x98/0xe0 [ 653.913619][T19071] tun_get_user+0x4bd/0x3090 [ 653.918303][T19071] ? tun_do_read+0x1c00/0x1c00 [ 653.923071][T19071] ? kstrtouint_from_user+0x1a0/0x200 [ 653.928461][T19071] ? __fsnotify_parent+0x5f5/0x6c0 [ 653.933742][T19071] ? avc_policy_seqno+0x1b/0x70 [ 653.938618][T19071] ? selinux_file_permission+0x2a5/0x510 [ 653.944362][T19071] ? fsnotify_perm+0x66/0x4b0 [ 653.949051][T19071] tun_chr_write_iter+0x1bf/0x270 [ 653.954255][T19071] vfs_write+0x725/0xd60 [ 653.958518][T19071] ? __bpf_trace_kmem_free+0x6f/0x90 [ 653.963893][T19071] ? kernel_write+0x3c0/0x3c0 [ 653.968580][T19071] ? __fget_files+0x2c4/0x320 [ 653.973279][T19071] ? __fdget_pos+0x1f7/0x380 [ 653.977878][T19071] ? ksys_write+0x71/0x240 [ 653.982483][T19071] ksys_write+0x140/0x240 [ 653.986873][T19071] ? __ia32_sys_read+0x90/0x90 [ 653.991764][T19071] ? fpu__clear_all+0x20/0x20 [ 653.996547][T19071] __x64_sys_write+0x7b/0x90 [ 654.001158][T19071] do_syscall_64+0x31/0x40 [ 654.005597][T19071] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 654.011767][T19071] RIP: 0033:0x7ff970b26929 [ 654.016191][T19071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 654.036938][T19071] RSP: 002b:00007ff96f18f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 654.045498][T19071] RAX: ffffffffffffffda RBX: 00007ff970d4dfa0 RCX: 00007ff970b26929 [ 654.053708][T19071] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 654.061788][T19071] RBP: 00007ff96f18f090 R08: 0000000000000000 R09: 0000000000000000 [ 654.069767][T19071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 654.078019][T19071] R13: 0000000000000000 R14: 00007ff970d4dfa0 R15: 00007ffe2c6634e8 [ 654.721970][T19110] device veth1_macvtap entered promiscuous mode [ 654.730031][T19110] device macsec0 entered promiscuous mode [ 654.737179][ T955] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 655.598146][T19149] FAULT_INJECTION: forcing a failure. [ 655.598146][T19149] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 655.612196][T19149] CPU: 1 PID: 19149 Comm: syz.3.6597 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 655.623603][T19149] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 655.633844][T19149] Call Trace: [ 655.637599][T19149] __dump_stack+0x21/0x24 [ 655.641941][T19149] dump_stack_lvl+0x169/0x1d8 [ 655.646639][T19149] ? show_regs_print_info+0x18/0x18 [ 655.651852][T19149] ? stack_trace_save+0x98/0xe0 [ 655.656719][T19149] dump_stack+0x15/0x1c [ 655.660943][T19149] should_fail+0x3c1/0x510 [ 655.665455][T19149] should_fail_usercopy+0x1a/0x20 [ 655.670860][T19149] _copy_from_user+0x20/0xd0 [ 655.675598][T19149] __copy_msghdr_from_user+0x448/0x5e0 [ 655.681358][T19149] ? __ia32_sys_shutdown+0x1e0/0x1e0 [ 655.687004][T19149] ? __fsnotify_parent+0x5f5/0x6c0 [ 655.692506][T19149] ___sys_sendmsg+0x156/0x260 [ 655.697262][T19149] ? __sys_sendmsg+0x250/0x250 [ 655.702282][T19149] ? rw_verify_area+0x1c0/0x360 [ 655.707416][T19149] ? __fdget+0x1a1/0x230 [ 655.712209][T19149] __x64_sys_sendmsg+0x1e2/0x2a0 [ 655.717175][T19149] ? fput+0x1a/0x20 [ 655.721002][T19149] ? ___sys_sendmsg+0x260/0x260 [ 655.726128][T19149] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 655.732451][T19149] do_syscall_64+0x31/0x40 [ 655.736888][T19149] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 655.742801][T19149] RIP: 0033:0x7fc040aeb929 [ 655.747401][T19149] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 655.767283][T19149] RSP: 002b:00007fc03f154038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 655.775965][T19149] RAX: ffffffffffffffda RBX: 00007fc040d12fa0 RCX: 00007fc040aeb929 [ 655.784043][T19149] RDX: 0000000000000000 RSI: 0000200000004440 RDI: 0000000000000004 [ 655.792024][T19149] RBP: 00007fc03f154090 R08: 0000000000000000 R09: 0000000000000000 [ 655.799996][T19149] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 655.807961][T19149] R13: 0000000000000000 R14: 00007fc040d12fa0 R15: 00007ffe103a5258 [ 655.880784][T19159] syz.1.6599[19159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 655.880867][T19159] syz.1.6599[19159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 663.559003][T19301] bridge0: port 3(veth0) entered blocking state [ 663.603884][T19301] bridge0: port 3(veth0) entered disabled state [ 663.623856][T19301] device veth0 entered promiscuous mode [ 664.016004][T19314] device sit0 left promiscuous mode [ 664.394038][T19327] FAULT_INJECTION: forcing a failure. [ 664.394038][T19327] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 664.413788][T19327] CPU: 1 PID: 19327 Comm: syz.0.6656 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 664.425288][T19327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 664.435849][T19327] Call Trace: [ 664.439267][T19327] __dump_stack+0x21/0x24 [ 664.443656][T19327] dump_stack_lvl+0x169/0x1d8 [ 664.448337][T19327] ? show_regs_print_info+0x18/0x18 [ 664.453584][T19327] ? kstrtouint_from_user+0x1a0/0x200 [ 664.458987][T19327] dump_stack+0x15/0x1c [ 664.463336][T19327] should_fail+0x3c1/0x510 [ 664.467763][T19327] should_fail_usercopy+0x1a/0x20 [ 664.472804][T19327] _copy_from_user+0x20/0xd0 [ 664.477458][T19327] ___sys_recvmsg+0x129/0x4f0 [ 664.482153][T19327] ? __sys_recvmsg+0x250/0x250 [ 664.486951][T19327] ? __fdget+0x1a1/0x230 [ 664.491215][T19327] __x64_sys_recvmsg+0x1dd/0x2a0 [ 664.496162][T19327] ? ___sys_recvmsg+0x4f0/0x4f0 [ 664.501118][T19327] ? syscall_trace_enter+0x108/0x170 [ 664.506412][T19327] do_syscall_64+0x31/0x40 [ 664.511016][T19327] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 664.516984][T19327] RIP: 0033:0x7ff970b26929 [ 664.521532][T19327] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 664.541711][T19327] RSP: 002b:00007ff96f18f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 664.550320][T19327] RAX: ffffffffffffffda RBX: 00007ff970d4dfa0 RCX: 00007ff970b26929 [ 664.558306][T19327] RDX: 0000000000000100 RSI: 0000200000001440 RDI: 0000000000000003 [ 664.566452][T19327] RBP: 00007ff96f18f090 R08: 0000000000000000 R09: 0000000000000000 [ 664.574426][T19327] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 664.582526][T19327] R13: 0000000000000000 R14: 00007ff970d4dfa0 R15: 00007ffe2c6634e8 [ 665.053309][T19339] device veth0_vlan left promiscuous mode [ 665.097265][T19339] device veth0_vlan entered promiscuous mode [ 665.162790][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 665.177906][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 665.186893][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 665.477543][T19363] device pim6reg1 entered promiscuous mode [ 666.611553][T19392] device veth0_vlan left promiscuous mode [ 666.633603][T19392] device veth0_vlan entered promiscuous mode [ 666.659485][ T955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 666.677639][ T955] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 666.693444][ T955] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 666.799870][T19406] device veth1_macvtap left promiscuous mode [ 666.831330][T19406] device veth1_macvtap entered promiscuous mode [ 666.939947][T19412] syz.0.6687[19412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 666.940039][T19412] syz.0.6687[19412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 667.249788][T19427] FAULT_INJECTION: forcing a failure. [ 667.249788][T19427] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 667.282499][T19427] CPU: 0 PID: 19427 Comm: syz.2.6693 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 667.294043][T19427] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 667.304306][T19427] Call Trace: [ 667.307611][T19427] __dump_stack+0x21/0x24 [ 667.312134][T19427] dump_stack_lvl+0x169/0x1d8 [ 667.316816][T19427] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 667.323074][T19427] ? show_regs_print_info+0x18/0x18 [ 667.328362][T19427] dump_stack+0x15/0x1c [ 667.333127][T19427] should_fail+0x3c1/0x510 [ 667.337634][T19427] should_fail_usercopy+0x1a/0x20 [ 667.342918][T19427] strncpy_from_user+0x24/0x2e0 [ 667.347795][T19427] ? kmem_cache_alloc+0x165/0x2e0 [ 667.353145][T19427] ? getname_flags+0xb9/0x500 [ 667.358299][T19427] getname_flags+0xf4/0x500 [ 667.362920][T19427] getname+0x19/0x20 [ 667.366855][T19427] do_sys_openat2+0xd9/0x6d0 [ 667.371485][T19427] ? hrtimer_interrupt+0x5c2/0xdc0 [ 667.376732][T19427] ? do_sys_open+0xe0/0xe0 [ 667.381443][T19427] ? kvm_sched_clock_read+0x18/0x40 [ 667.386662][T19427] ? sched_clock+0x3a/0x40 [ 667.391092][T19427] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 667.397166][T19427] __x64_sys_openat+0x136/0x160 [ 667.402025][T19427] do_syscall_64+0x31/0x40 [ 667.406809][T19427] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 667.412723][T19427] RIP: 0033:0x7f142f79d929 [ 667.417149][T19427] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 667.438278][T19427] RSP: 002b:00007f142de06038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 667.447370][T19427] RAX: ffffffffffffffda RBX: 00007f142f9c4fa0 RCX: 00007f142f79d929 [ 667.455440][T19427] RDX: 0000000000200002 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 667.463506][T19427] RBP: 00007f142de06090 R08: 0000000000000000 R09: 0000000000000000 [ 667.472208][T19427] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 667.480702][T19427] R13: 0000000000000000 R14: 00007f142f9c4fa0 R15: 00007ffe6ed34968 [ 667.493302][T19434] FAULT_INJECTION: forcing a failure. [ 667.493302][T19434] name failslab, interval 1, probability 0, space 0, times 0 [ 667.506031][T19434] CPU: 1 PID: 19434 Comm: syz.0.6697 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 667.517537][T19434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 667.527687][T19434] Call Trace: [ 667.530989][T19434] __dump_stack+0x21/0x24 [ 667.535402][T19434] dump_stack_lvl+0x169/0x1d8 [ 667.540075][T19434] ? thaw_kernel_threads+0x220/0x220 [ 667.545389][T19434] ? show_regs_print_info+0x18/0x18 [ 667.550666][T19434] ? kfree_skbmem+0x10c/0x180 [ 667.555335][T19434] ? consume_skb+0xc1/0x1f0 [ 667.559837][T19434] dump_stack+0x15/0x1c [ 667.564093][T19434] should_fail+0x3c1/0x510 [ 667.568506][T19434] ? __alloc_skb+0x9e/0x520 [ 667.573179][T19434] __should_failslab+0xa4/0xe0 [ 667.578043][T19434] should_failslab+0x9/0x20 [ 667.582860][T19434] kmem_cache_alloc+0x3d/0x2e0 [ 667.587936][T19434] ? find_next_bit+0xc9/0x100 [ 667.592826][T19434] ? cpumask_next+0x12/0x30 [ 667.597618][T19434] __alloc_skb+0x9e/0x520 [ 667.601966][T19434] inet6_rt_notify+0x287/0x470 [ 667.606745][T19434] ? rt6_nh_dump_exceptions+0x690/0x690 [ 667.612399][T19434] ? call_fib_notifiers+0xa0/0xc0 [ 667.617723][T19434] fib6_del+0xbf9/0xf60 [ 667.622082][T19434] ? bpf_ringbuf_discard+0x123/0x170 [ 667.627566][T19434] ? fib6_locate+0x460/0x460 [ 667.632159][T19434] ? __kasan_check_write+0x14/0x20 [ 667.637524][T19434] ? finish_task_switch+0x1b7/0x5a0 [ 667.642745][T19434] ? fib6_ifdown+0x2eb/0x4e0 [ 667.647333][T19434] fib6_clean_node+0x296/0x520 [ 667.652440][T19434] ? node_free_rcu+0x30/0x30 [ 667.657060][T19434] ? __kasan_check_read+0x11/0x20 [ 667.662081][T19434] fib6_walk_continue+0x4fc/0x700 [ 667.667103][T19434] fib6_walk+0x153/0x290 [ 667.671537][T19434] fib6_clean_all+0x16a/0x230 [ 667.676214][T19434] ? tracing_record_taskinfo+0x7c/0x220 [ 667.681765][T19434] ? rt6_sync_down_dev+0x130/0x130 [ 667.686996][T19434] ? fib6_del+0xf60/0xf60 [ 667.691692][T19434] ? node_free_rcu+0x30/0x30 [ 667.696312][T19434] ? rt6_sync_down_dev+0x130/0x130 [ 667.701636][T19434] ? schedule_preempt_disabled+0x20/0x20 [ 667.707494][T19434] rt6_disable_ip+0x119/0x6a0 [ 667.712318][T19434] ? preempt_schedule_thunk+0x16/0x18 [ 667.718195][T19434] ? __queue_work+0x951/0xca0 [ 667.722898][T19434] ? fib6_ifdown+0x4e0/0x4e0 [ 667.727702][T19434] ? __kasan_check_read+0x11/0x20 [ 667.732909][T19434] addrconf_ifdown+0x144/0x1800 [ 667.738114][T19434] ? addrconf_cleanup+0x1c0/0x1c0 [ 667.743153][T19434] ? __kasan_check_write+0x14/0x20 [ 667.748303][T19434] ? mutex_lock+0x8c/0xe0 [ 667.752630][T19434] ? mutex_trylock+0xa0/0xa0 [ 667.757220][T19434] ? nf_nat_masq_schedule+0x490/0x490 [ 667.762588][T19434] ? __kasan_check_write+0x14/0x20 [ 667.767727][T19434] addrconf_notify+0x3bd/0xe90 [ 667.772489][T19434] raw_notifier_call_chain+0x90/0x100 [ 667.778107][T19434] dev_close_many+0x330/0x4d0 [ 667.783112][T19434] ? __dev_open+0x4c0/0x4c0 [ 667.787886][T19434] ? _raw_spin_lock+0x8e/0xe0 [ 667.792612][T19434] ? __kasan_check_read+0x11/0x20 [ 667.797653][T19434] unregister_netdevice_many+0x44c/0x1980 [ 667.803380][T19434] ? __mod_timer+0x7ae/0xb30 [ 667.808156][T19434] ? ____kasan_slab_free+0x130/0x160 [ 667.813444][T19434] ? alloc_netdev_mqs+0xc80/0xc80 [ 667.818665][T19434] ? add_timer+0x68/0x80 [ 667.822904][T19434] ? __queue_delayed_work+0x173/0x200 [ 667.828303][T19434] ? __kasan_check_read+0x11/0x20 [ 667.833341][T19434] unregister_netdevice_queue+0x31c/0x360 [ 667.839103][T19434] ? linkwatch_urgent_event+0x3a0/0x4a0 [ 667.844748][T19434] ? list_netdevice+0x4c0/0x4c0 [ 667.849594][T19434] ? linkwatch_fire_event+0x2d3/0x330 [ 667.854960][T19434] __tun_detach+0xca6/0x1450 [ 667.859715][T19434] ? tun_chr_open+0x540/0x540 [ 667.864492][T19434] tun_chr_close+0x92/0x140 [ 667.869214][T19434] __fput+0x2fb/0x770 [ 667.873736][T19434] ____fput+0x15/0x20 [ 667.877717][T19434] task_work_run+0x127/0x190 [ 667.882479][T19434] exit_to_user_mode_loop+0xcb/0xe0 [ 667.887671][T19434] syscall_exit_to_user_mode+0x68/0x90 [ 667.893634][T19434] do_syscall_64+0x3d/0x40 [ 667.898279][T19434] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 667.904195][T19434] RIP: 0033:0x7ff970b26929 [ 667.908741][T19434] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 667.928646][T19434] RSP: 002b:00007ff96f18f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 667.937677][T19434] RAX: 0000000000000000 RBX: 00007ff970d4dfa0 RCX: 00007ff970b26929 [ 667.946190][T19434] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000009 [ 667.954258][T19434] RBP: 00007ff96f18f090 R08: 0000000000000000 R09: 0000000000000000 [ 667.962524][T19434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 667.970564][T19434] R13: 0000000000000000 R14: 00007ff970d4dfa0 R15: 00007ffe2c6634e8 [ 667.997572][T19437] device veth1_to_bond entered promiscuous mode [ 668.238655][T19459] Â: renamed from pim6reg1 [ 668.396154][T19471] device veth0_vlan left promiscuous mode [ 668.420577][T19471] device veth0_vlan entered promiscuous mode [ 668.440446][T19471] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 668.454370][ T955] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 668.463438][ T955] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 668.479173][ T955] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 669.654310][T19505] FAULT_INJECTION: forcing a failure. [ 669.654310][T19505] name failslab, interval 1, probability 0, space 0, times 0 [ 669.673873][T19505] CPU: 1 PID: 19505 Comm: syz.4.6725 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 669.685392][T19505] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 669.695930][T19505] Call Trace: [ 669.699244][T19505] __dump_stack+0x21/0x24 [ 669.703617][T19505] dump_stack_lvl+0x169/0x1d8 [ 669.708325][T19505] ? show_regs_print_info+0x18/0x18 [ 669.713549][T19505] dump_stack+0x15/0x1c [ 669.718038][T19505] should_fail+0x3c1/0x510 [ 669.722474][T19505] ? kvmalloc_node+0x88/0x130 [ 669.727151][T19505] __should_failslab+0xa4/0xe0 [ 669.732091][T19505] should_failslab+0x9/0x20 [ 669.736693][T19505] __kmalloc+0x60/0x330 [ 669.741302][T19505] kvmalloc_node+0x88/0x130 [ 669.746146][T19505] btf_check_all_metas+0x347/0x820 [ 669.751343][T19505] btf_parse_type_sec+0xea/0x15a0 [ 669.756355][T19505] ? btf_check_sec_info+0x27a/0x330 [ 669.761545][T19505] ? btf_check_sec_info+0x330/0x330 [ 669.766742][T19505] ? btf_verifier_log+0x2a0/0x2a0 [ 669.771770][T19505] ? memcpy+0x56/0x70 [ 669.775741][T19505] ? btf_parse_hdr+0x5d6/0x7b0 [ 669.780689][T19505] ? btf_parse_str_sec+0x1aa/0x260 [ 669.785904][T19505] btf_new_fd+0x562/0xa00 [ 669.790256][T19505] bpf_btf_load+0x5e/0x70 [ 669.794584][T19505] __se_sys_bpf+0x48a/0x680 [ 669.799117][T19505] ? __x64_sys_bpf+0x90/0x90 [ 669.803710][T19505] ? fpu__clear_all+0x20/0x20 [ 669.808378][T19505] __x64_sys_bpf+0x7b/0x90 [ 669.812894][T19505] do_syscall_64+0x31/0x40 [ 669.817506][T19505] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 669.823418][T19505] RIP: 0033:0x7fbf14d83929 [ 669.828136][T19505] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 669.847951][T19505] RSP: 002b:00007fbf133ec038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 669.856548][T19505] RAX: ffffffffffffffda RBX: 00007fbf14faafa0 RCX: 00007fbf14d83929 [ 669.865037][T19505] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 0000000000000012 [ 669.873116][T19505] RBP: 00007fbf133ec090 R08: 0000000000000000 R09: 0000000000000000 [ 669.881226][T19505] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 669.889379][T19505] R13: 0000000000000000 R14: 00007fbf14faafa0 R15: 00007fff52596a98 [ 670.624285][T19551] device pim6reg1 entered promiscuous mode [ 671.787865][T19568] FAULT_INJECTION: forcing a failure. [ 671.787865][T19568] name failslab, interval 1, probability 0, space 0, times 0 [ 671.801303][T19568] CPU: 1 PID: 19568 Comm: syz.1.6749 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 671.812961][T19568] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 671.823466][T19568] Call Trace: [ 671.826869][T19568] __dump_stack+0x21/0x24 [ 671.831255][T19568] dump_stack_lvl+0x169/0x1d8 [ 671.835955][T19568] ? thaw_kernel_threads+0x220/0x220 [ 671.841510][T19568] ? show_regs_print_info+0x18/0x18 [ 671.846806][T19568] dump_stack+0x15/0x1c [ 671.850994][T19568] should_fail+0x3c1/0x510 [ 671.855508][T19568] ? kvmalloc_node+0x88/0x130 [ 671.860548][T19568] __should_failslab+0xa4/0xe0 [ 671.865426][T19568] should_failslab+0x9/0x20 [ 671.869951][T19568] __kmalloc+0x60/0x330 [ 671.874171][T19568] ? btf_check_all_metas+0x747/0x820 [ 671.879658][T19568] kvmalloc_node+0x88/0x130 [ 671.884169][T19568] btf_parse_type_sec+0x179/0x15a0 [ 671.889668][T19568] ? btf_check_sec_info+0x27a/0x330 [ 671.894872][T19568] ? btf_check_sec_info+0x330/0x330 [ 671.900085][T19568] ? btf_verifier_log+0x2a0/0x2a0 [ 671.905379][T19568] ? memcpy+0x56/0x70 [ 671.909368][T19568] ? btf_parse_hdr+0x5d6/0x7b0 [ 671.914133][T19568] ? btf_parse_str_sec+0x1aa/0x260 [ 671.919477][T19568] btf_new_fd+0x562/0xa00 [ 671.923898][T19568] bpf_btf_load+0x5e/0x70 [ 671.928387][T19568] __se_sys_bpf+0x48a/0x680 [ 671.932900][T19568] ? __x64_sys_bpf+0x90/0x90 [ 671.937684][T19568] __x64_sys_bpf+0x7b/0x90 [ 671.942109][T19568] do_syscall_64+0x31/0x40 [ 671.946534][T19568] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 671.952722][T19568] RIP: 0033:0x7fb732017929 [ 671.957263][T19568] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 671.977737][T19568] RSP: 002b:00007fb730680038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 671.986289][T19568] RAX: ffffffffffffffda RBX: 00007fb73223efa0 RCX: 00007fb732017929 [ 671.994360][T19568] RDX: 0000000000000028 RSI: 0000200000000280 RDI: 0000000000000012 [ 672.002428][T19568] RBP: 00007fb730680090 R08: 0000000000000000 R09: 0000000000000000 [ 672.010399][T19568] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 672.018415][T19568] R13: 0000000000000001 R14: 00007fb73223efa0 R15: 00007ffec11ac168 [ 672.888202][T19587] device pim6reg1 entered promiscuous mode [ 673.895581][T19622] device pim6reg1 entered promiscuous mode [ 674.058058][T19629] FAULT_INJECTION: forcing a failure. [ 674.058058][T19629] name failslab, interval 1, probability 0, space 0, times 0 [ 674.107470][T19631] FAULT_INJECTION: forcing a failure. [ 674.107470][T19631] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 674.143524][T19629] CPU: 1 PID: 19629 Comm: syz.1.6771 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 674.155494][T19629] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 674.166111][T19629] Call Trace: [ 674.169477][T19629] __dump_stack+0x21/0x24 [ 674.173821][T19629] dump_stack_lvl+0x169/0x1d8 [ 674.178592][T19629] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 674.184849][T19629] ? show_regs_print_info+0x18/0x18 [ 674.190181][T19629] ? dump_stack+0x9/0x1c [ 674.194422][T19629] dump_stack+0x15/0x1c [ 674.198733][T19629] should_fail+0x3c1/0x510 [ 674.203239][T19629] ? __delayacct_tsk_init+0x2c/0xa0 [ 674.208432][T19629] __should_failslab+0xa4/0xe0 [ 674.213445][T19629] should_failslab+0x9/0x20 [ 674.218180][T19629] kmem_cache_alloc+0x3d/0x2e0 [ 674.222976][T19629] __delayacct_tsk_init+0x2c/0xa0 [ 674.228003][T19629] copy_process+0x9f3/0x32c0 [ 674.232850][T19629] ? __irq_exit_rcu+0x40/0x150 [ 674.237697][T19629] ? irq_exit_rcu+0x9/0x10 [ 674.242368][T19629] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 674.248169][T19629] ? __pidfd_prepare+0x150/0x150 [ 674.253118][T19629] ? kernel_clone+0x75/0x940 [ 674.257699][T19629] kernel_clone+0x23f/0x940 [ 674.262207][T19629] ? irq_exit_rcu+0x9/0x10 [ 674.266707][T19629] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 674.272625][T19629] ? create_io_thread+0x130/0x130 [ 674.277744][T19629] __x64_sys_clone+0x176/0x1d0 [ 674.282500][T19629] ? __ia32_sys_vfork+0xf0/0xf0 [ 674.287353][T19629] do_syscall_64+0x31/0x40 [ 674.292070][T19629] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 674.298076][T19629] RIP: 0033:0x7fb732017929 [ 674.302954][T19629] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 674.322698][T19629] RSP: 002b:00007fb73067ffe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 674.331387][T19629] RAX: ffffffffffffffda RBX: 00007fb73223efa0 RCX: 00007fb732017929 [ 674.339630][T19629] RDX: 0000000000000000 RSI: 0000000000020010 RDI: 0000000022023400 [ 674.348076][T19629] RBP: 00007fb730680090 R08: 0000000000000000 R09: 0000000000000000 [ 674.356045][T19629] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 674.364028][T19629] R13: 0000000000000000 R14: 00007fb73223efa0 R15: 00007ffec11ac168 [ 674.411972][T19631] CPU: 0 PID: 19631 Comm: syz.2.6772 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 674.423648][T19631] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 674.433816][T19631] Call Trace: [ 674.437245][T19631] __dump_stack+0x21/0x24 [ 674.441827][T19631] dump_stack_lvl+0x169/0x1d8 [ 674.446504][T19631] ? show_regs_print_info+0x18/0x18 [ 674.451702][T19631] dump_stack+0x15/0x1c [ 674.455951][T19631] should_fail+0x3c1/0x510 [ 674.460370][T19631] should_fail_alloc_page+0x4f/0x60 [ 674.465586][T19631] __alloc_pages_nodemask+0x109/0x5f0 [ 674.471339][T19631] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 674.477035][T19631] shmem_alloc_page+0x1b1/0x300 [ 674.482141][T19631] ? put_page+0xd0/0xd0 [ 674.486288][T19631] ? sched_clock_cpu+0x1b/0x3d0 [ 674.491143][T19631] ? percpu_counter_add_batch+0x13c/0x160 [ 674.496904][T19631] shmem_alloc_and_acct_page+0x36f/0x7b0 [ 674.502724][T19631] ? shmem_swapin_page+0x16c0/0x16c0 [ 674.508215][T19631] ? xas_load+0x28b/0x2a0 [ 674.512638][T19631] ? find_get_entry+0x366/0x3c0 [ 674.517801][T19631] ? page_cache_prev_miss+0x270/0x270 [ 674.523392][T19631] ? __kasan_check_write+0x14/0x20 [ 674.528639][T19631] ? up_read+0x12/0x50 [ 674.532707][T19631] ? do_user_addr_fault+0x791/0xc80 [ 674.538092][T19631] ? find_lock_entry+0x4b/0x200 [ 674.543204][T19631] shmem_getpage_gfp+0x625/0x2110 [ 674.548321][T19631] shmem_write_begin+0xce/0x1b0 [ 674.553318][T19631] generic_perform_write+0x2be/0x510 [ 674.558717][T19631] ? grab_cache_page_write_begin+0xb0/0xb0 [ 674.564549][T19631] ? file_remove_privs+0x580/0x580 [ 674.569684][T19631] ? __kasan_check_write+0x14/0x20 [ 674.574897][T19631] ? down_write+0xac/0x110 [ 674.579324][T19631] __generic_file_write_iter+0x24b/0x480 [ 674.585809][T19631] ? generic_write_checks+0x3d4/0x480 [ 674.591388][T19631] generic_file_write_iter+0xa9/0x1d0 [ 674.596769][T19631] vfs_write+0x725/0xd60 [ 674.601243][T19631] ? kernel_write+0x3c0/0x3c0 [ 674.605950][T19631] ? mutex_trylock+0xa0/0xa0 [ 674.610559][T19631] ? __fget_files+0x2c4/0x320 [ 674.615324][T19631] ? __fdget_pos+0x2d2/0x380 [ 674.619912][T19631] ? ksys_write+0x71/0x240 [ 674.624331][T19631] ksys_write+0x140/0x240 [ 674.628760][T19631] ? __ia32_sys_read+0x90/0x90 [ 674.633518][T19631] ? debug_smp_processor_id+0x17/0x20 [ 674.639000][T19631] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 674.645091][T19631] __x64_sys_write+0x7b/0x90 [ 674.649812][T19631] do_syscall_64+0x31/0x40 [ 674.654229][T19631] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 674.660333][T19631] RIP: 0033:0x7f142f79d929 [ 674.664757][T19631] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 674.684871][T19631] RSP: 002b:00007f142de06038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 674.693299][T19631] RAX: ffffffffffffffda RBX: 00007f142f9c4fa0 RCX: 00007f142f79d929 [ 674.701554][T19631] RDX: 00000000002a979d RSI: 0000200000000000 RDI: 0000000000000004 [ 674.709529][T19631] RBP: 00007f142de06090 R08: 0000000000000000 R09: 0000000000000000 [ 674.718008][T19631] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 674.726161][T19631] R13: 0000000000000000 R14: 00007f142f9c4fa0 R15: 00007ffe6ed34968 [ 675.047409][T19655] device pim6reg1 entered promiscuous mode [ 677.572809][T19691] FAULT_INJECTION: forcing a failure. [ 677.572809][T19691] name failslab, interval 1, probability 0, space 0, times 0 [ 677.599049][T19691] CPU: 1 PID: 19691 Comm: syz.3.6795 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 677.610886][T19691] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 677.620988][T19691] Call Trace: [ 677.624302][T19691] __dump_stack+0x21/0x24 [ 677.628756][T19691] dump_stack_lvl+0x169/0x1d8 [ 677.633616][T19691] ? show_regs_print_info+0x18/0x18 [ 677.638909][T19691] dump_stack+0x15/0x1c [ 677.643091][T19691] should_fail+0x3c1/0x510 [ 677.647586][T19691] ? __kernfs_new_node+0xdb/0x680 [ 677.652616][T19691] __should_failslab+0xa4/0xe0 [ 677.657390][T19691] should_failslab+0x9/0x20 [ 677.661897][T19691] kmem_cache_alloc+0x3d/0x2e0 [ 677.666790][T19691] __kernfs_new_node+0xdb/0x680 [ 677.671674][T19691] ? down_write+0xac/0x110 [ 677.676203][T19691] ? kernfs_new_node+0x260/0x260 [ 677.681164][T19691] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 677.687263][T19691] ? __kasan_check_write+0x14/0x20 [ 677.692457][T19691] ? up_write+0x57/0x120 [ 677.696731][T19691] kernfs_new_node+0x150/0x260 [ 677.701506][T19691] __kernfs_create_file+0x4e/0x270 [ 677.706627][T19691] sysfs_add_file_mode_ns+0x29a/0x350 [ 677.712009][T19691] internal_create_group+0x489/0xcf0 [ 677.717312][T19691] ? irq_exit_rcu+0x9/0x10 [ 677.721822][T19691] ? sysfs_create_group+0x30/0x30 [ 677.726854][T19691] sysfs_create_groups+0x58/0x120 [ 677.732166][T19691] device_add_attrs+0x8c/0x430 [ 677.737101][T19691] ? device_add_class_symlinks+0x27e/0x2c0 [ 677.743171][T19691] device_add+0x504/0xbf0 [ 677.747543][T19691] ? device_initialize+0x1e1/0x420 [ 677.752677][T19691] netdev_register_kobject+0x179/0x320 [ 677.758241][T19691] ? raw_notifier_call_chain+0xe9/0x100 [ 677.763970][T19691] register_netdevice+0xddd/0x13c0 [ 677.769182][T19691] ? netif_stacked_transfer_operstate+0x220/0x220 [ 677.775605][T19691] ? full_name_hash+0xa0/0xf0 [ 677.780628][T19691] ppp_dev_configure+0x814/0xac0 [ 677.786023][T19691] ppp_ioctl+0x6b9/0x1550 [ 677.790370][T19691] ? ppp_poll+0x250/0x250 [ 677.794896][T19691] ? __fget_files+0x2c4/0x320 [ 677.799983][T19691] ? security_file_ioctl+0x84/0xa0 [ 677.805244][T19691] ? ppp_poll+0x250/0x250 [ 677.809764][T19691] __se_sys_ioctl+0x121/0x1a0 [ 677.814710][T19691] __x64_sys_ioctl+0x7b/0x90 [ 677.819311][T19691] do_syscall_64+0x31/0x40 [ 677.823970][T19691] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 677.830083][T19691] RIP: 0033:0x7fc040aeb929 [ 677.834618][T19691] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 677.854243][T19691] RSP: 002b:00007fc03f154038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 677.863305][T19691] RAX: ffffffffffffffda RBX: 00007fc040d12fa0 RCX: 00007fc040aeb929 [ 677.871314][T19691] RDX: 000000110c230000 RSI: 00000000c004743e RDI: 0000000000000004 [ 677.879753][T19691] RBP: 00007fc03f154090 R08: 0000000000000000 R09: 0000000000000000 [ 677.887952][T19691] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 677.896424][T19691] R13: 0000000000000000 R14: 00007fc040d12fa0 R15: 00007ffe103a5258 [ 678.075861][T19700] device pim6reg1 entered promiscuous mode [ 678.688643][T19743] @0Ù: renamed from bond_slave_1 [ 678.725720][T19743] device pim6reg1 entered promiscuous mode [ 679.823612][T19779] device pim6reg1 entered promiscuous mode [ 683.733749][T19912] device wg2 left promiscuous mode [ 685.726678][T19961] device syzkaller0 entered promiscuous mode [ 687.763141][T20062] device pim6reg1 entered promiscuous mode