last executing test programs: 3.42534605s ago: executing program 1 (id=2454): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x43, 0x0, 0x3, 0x8008a, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x6}, 0x0, 0xc8, 0x0, 0x0, 0x1, 0x2, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x60ae0}], 0x300, 0x0, 0xdb0, 0xf5ffffff}, 0x0) close(r7) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff0200000000000000000001ffaaaaaa"], 0xfdef) close(r1) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) write$cgroup_devices(r9, &(0x7f0000000140)=ANY=[@ANYBLOB], 0xffdd) 3.013807366s ago: executing program 1 (id=2458): bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r4) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x8901, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x110c23003f) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001580)={0x0, 0x0, &(0x7f0000001400)=[{&(0x7f0000000080)="3bfdd75fa5717852d59a9367444a2130e72cd4dabc8854532cca0c32a5b9f844a4610c7525650ce3d3b76b15026d93e6dee896115e9364066aa3d14e33ef732b4681335c576902153114bdb9c74b538a71115fb1d1a63d1b04129661b29aab89d0be999a6b7c9bea755adedbf305a79f70b71d3d4c98577b49db4963ce89b0def5e840f459659cb6f86d56b069a5de11d601d348ff88ca6e5e2cfe40176880b33e9e8dbc32ba2e6a99b1b50276dc4f06166000d7069a3cc76f", 0xb9}, {&(0x7f0000000180)="892950e2405ee8629d9384a90f16d1706a3e61f305119f95cac0f1927f4c205b971eb41147cb1f86883d6910e68ac3996551800b3ec64b77f8444b18345a2c8b178eeeba0cde7319a5a46bfe7f5770e019efd9d52069edcced33a758c4e657f3a792dc193a1911b4e82ea800ad7afe03c851a8", 0x73}, {&(0x7f0000000200)="a68cde0d56b170df7710b54f17d9a39c4f98f3547190", 0x20000216}, {&(0x7f0000000240)="45e04400f2b383517a08c397dd0a76e67ecfc8e74573c24dedd3a48fb62418c1412fdcd15e888cb0f5d02e77bfecefda6b064c0bb2b66a9a522e63873dde02330510255eec7dfa1af708cdab59fb71eca786a359a2c3b0cbad35144ec5b069c53f90e43339845dc7fd140c55b0149ab38eb27c140f374bcc2c95b0b121d1a9302f3a01b888243b3fc0d46f0de0", 0x8d}, {&(0x7f0000000300)="87fb74cf4d67adbbd062637f514c1f5eb18d7b442e6457a356c6cb1f71a43dfae773c8489cce5145f92615d4bdb13ef54d6ae90ec7733180fcf5adf3e13fdb05b57b748bd14eda042a97fdd84498304a504a0a159b972e8200c2d0f536a3465ec498ed12b924bd134057df36129d3ebe3dd3ce9f0671e5278143e4afa3d43f444681de1b5f9725fca34fa357fe2154981666fb9dc202fc17a0199eb1c25bdd1005e590e84783ee9894c888998dc25a83c14aeee31d114acfa0bcd235d571cd765f4b9259ba43e6fc30291d8a642146c4771898030b736aeee6b247abb0784b154e104e7dcda401f9b1736fea30a41a4153fe6a9a525bd0a3487571f914f05b590e242341ade289d8f5b842c6be4a93c2755dfd47174def782a2f8f61c068b5a012f02c0801601e860def788121e8808c01fed4c920a3698d0d684920918c95b17f76bbcb4f265c931d8f79560ff8114b70f4dd6791e2ed70cfeb89905791b88be26efe1c5c66b7b50b3d2be0dbc066dfc31618f9507f6f340b85a2f76a6dcac9d6ccc289ace5e5fecd25afe22ffa451f5e365ab33cc985f2e9d7f7fb1be4794740a94215d7db14b0ffcec19e5e3c5ae0d8578ef3b65d2a7a77a11e390a6c3a6b391061c886b961e3c2f42d62047bfe1356a44b840d3d956105f4c0fa95db08c4933f00de77cdc057c28b41fecfc8398c442be1ad065954f6c9dfeb2fd7207e8548a00a1d50bdf522d2abfdafd71723616a34830fbfa8fc81e0c2639cc12f363a4919b7a00ac8189dad3e7e54122a2ef430f623658d5e281c9a19442995bb9b0e3f7d13e3016b6f9523be196bf23bbcc5ec802f43ef8b651d688d9d5a44f35c9847e4c32bce3e9ebed2326adadc76f06a195db32c80b3090d7cd65c9d8518ba4e528c5eb5c7a1c5695b21595fa8a8621734bfda8afddd65e1f37a1990220a00fa9bd2c22b0117ceb08ae6af3c944c2eca924abfddad065d1472d0c3f742a49b1e78c669471873706ad157d831d7482b773f07b0673a6ce1e227a7a4d13744bf459434c0ab1c323a38b1a84cbf1ce9741f2b8fdcc2e073e56171603d035aacd83e71d5132831f4f1e8bf517979f132a33fd03783272e9b8c96dfa4e1d320a58d82acfc8d3d53a5a52daafe4dc8be08f4ad53e11cc21374b6ff4ff5ea2ecc5d3f7c057f74f0098e57d990090475cdaffdef0da917653ed10fb70b94b72e5b4d95cbea0fc1dd2579635ad6ab545ba4d7b6d2f5442bdb78beb6c8ed62942a439117025b4566b48d9f3a17fdf4577e8606a4bc4c26557e58312fd2d1a541ebec3e5ae28eef8b2ab0597083716dd12889335570ee7839530eee879d9b137606cd4dd7103991671b4464bb68529eb19fb7a8845e3491bfbac688a87cf0744f429ea112014402915c4c1f6bae08d689d3cb7d641d7befe8fc74a2242310a9a367a39531b4c86da5b39df524e52f33ff9c40b48cb196ffc9ca855b6e698ade8a83e52b9ddc5031ff09e1907e4f8b0d07e64e1fb8e427f8819a7be907aa216bf8e2a4c7cc87ed53bf9490d4cc788b91f3b9f705e984a7e62c7a495e8421b97c39dc954b35468f17c6682334f4e16308448f457faeffff6d1f818522fa441d3a48168bdb12ffebace436a3915b63076cb6a655718647f87eaaf313b5bbd430421eed3a2215e439600a56eac8c65291eb103326a8034662bd337ab51577d9110ec7151be5cc9c54b2a30891acac5ad006ed537dbeb8f16eecbde7cf4e71373faf3c36b772f6d7ea9346875c8cf1049d49d4f8eb01b946c11e8c8e3ab2015f282167acddcc77fff03e1be9134252af0abfe538b4d25fc4ff874b52b9fb0996b5f32b4141dbd30578ff46e13ef6c63fc1620f62cb11a3dce401993976c272a5f62fde3f2a0e654d19e7a39dcdb622b9526d2a15cc18e6f817c916a00775353dd9c8954e66d0445b59bb0f5e6e3b46447232f52a0e398b057d123ef503afcbd48544db6434d2025bfc8dab72262a4fa5426a03061e7f8966e0086ff8ab5a91ab59f19b830394ee8bc76d6fb4816b8f4cde35b7eb9d3811228d51c54828f97fd1e648196c81bc73ed56249a59f318704e84656a6cedd2b8c1e1808d1cc648749abc643131e494c01336d4a14b8609656f2c972dc23c5c2e43fe40119fb88b5ec2aade35c03646e347354c493de8ab3672ccf94af0df333c6678299129d79be0eec281c5b3858ce3995566a390b674635b356692e3e9c53a089638ba0d69e772b7b410a5ae03de12e7de755ee559e1707b7b8003aabc8e2ce03c01e3183ff2d93262f6d5ceaafecdae66bc7cb3952c5a6571d864d502f281db5a228695badca5d022fdb6da56ab15dc377d1c1f8581ff56e28c2b2a84edb629547d28275c2ed571103b4ca7cdeb0776ba9f9dffcd78d21c3d4caa9289ed199672f4e7b912068c49c817114c37d37ea03954bae87d1ddae3da2ad85feb2fbb735b75a51f7bee5c8d88cc7bf64700d1a46ec6b631ae22ac7b06730a86a26bdcb992e1c7b50142de96b14a8468e4514068a30896fc677fddefaebb125c693a8d460469c7fe535f844781940f66d6abd091191c3122d584f5b0f5b0d443713d7d5186124d73de28aca30b719d4a55e09d259bddbf16995aeb1000880890afbd24d4066b0398985a40999de22ce176348e1c1f57eaf75b92a1e4f1482e89a00ac2cc36b20e36af9ec310599c19a5b1d6f8fadba104c58c801c6633315f82ebfa88faddd0b693e2f827f586c1cc5538e93bcf10f81af6dd7ee727df3b5018c0b4e31e40d040a47503b6ace4d29a1162ce487351825255f5584aff7cbd421f85c3d9fbb3784abd9848f16028b68f0d32ed8bb80106e8cc4acb939ff88bd39976d166b2addebf628b3fcd056da2f60e1b90f7a32702954921908ebccb683622a1f574ceba6951bef5e751c338c8279318dc28e36b9fc2bb17c3ad08aceb00fc388e6db112a738f86a4a1eb11526e1b9d73250b326285ed47c4398d93a3933d9a784249b65ad7d78a1f81d96ef36493ed693045a2150a8eb43cecc0c93e7d20b15b39a0646b081c2923b816365b7fbb41683a41732d942c5aa12faf876ec7f036becde8f3295af6dacff38d076d8e06260fee167703bb610745374a2758a6b88e465ca77d1f3105ae8b6b04a1eb509fb178d6249dbbc84d5d1d069278449a89d03e4a9a395d8170c329a296cfc329798cb9b9f1078d098cf3f989fd4ec53e013fbe917df35292d44fb1f3da4da4432a1847d4721514ade8cda5e5c0b51183580fc35266a970ebba74faeda56d4dcb56df51f96ad237452cedbd0cb2bee112713c3d450835811bf3da9745136d428e148fd0932dc77c8d8e61a16c625241fad8425b4ece394eedd5f165bd94923bfa1172be8edc8a4fcaae5f77ee8cc510192b27964da09c3e84efb4bc7154da1a24da8b7e544b42278d2574687ec76143afa6cf193d52a2a7f4c20ee57b6056a1337d5e408117a6cf1ab49c8980f39597f69902085d3e8d374d44e6ab4ed1185a26be2bc7281e9cfbbeb6bed899aa1924d3faa06d95999fbeaf2337494e0c2c39eef5a73fcde84459a9ea48d4e015d9e5bb5839354967ce02f637bc8678d2595b9a918fc36b927d7501f0ac2e3471ce02b5df355689c87f191ef5390900a41deec29984e45a878ece964b0009aad561316fc3b30ce1b49266d32eb17cd30f3e17e1f59014e8c518940dd0a093d1349c1a7c2581963bbe0ba372b6426e81c33c71b2ec8141c5713e52a37fff0a417a5b259e1420d9fb6a731f5baa0cc494221947895aa8fa14745a986a366bff9d0c239a19f85372497565b5b703da16439019df5f3d29f4247fb528854c9648630f03e9dedde5a08a47728ea6a4d42e62eff6fa3bd402325e0f4387b60171c37c180f958ad80955779c899517e7ea76eed00598e01552eaaf08b723daf9d466e8c57af43a15a46528b1119f5074aa3c51f77357ebe158275bc06b89640d7ce3c0a03af01418d7dc6ae8a1be8ab08c1722d66d1e9277480b8b178447667c024f9b78f8a878a2d7cf8e83e5104f6964b2907a989abafc7d7d0df941abf3d7283b6a11d46c2911a42182ec27ab785d92946e1ee8ef44846d561850d2a98c305c382f36d4cfc9b2bfd3b86ef21a0d187adcafbec8268c7d662a34dda1c83c4967097743133bc8c587edf249f5668c34ddb112fa4eb1bea9c8f6a000f1f34428b54688a5e214a7919868b25dbe930e86a243ecf54afe0b518c647d04873d2cf62cb2ab27f00015537a4fd2ea3dc8777abdf3284622347016566da0b9c406ca8c40694e4013a53fbf2e803d51b0bbe5e9df5fc74f66be618856357ccf803c53ed0e3b3fe79f69f0ede9b565d8f7a8ce5aa8cbb4e8fa61be3fd00ffb07e45065498925c14c0b311942d4ed951ad6237aadb5405bc7b2d79e1fd295b7c2ed8efa883e44c86a5053e2f421c6d4dc0c47d3a05d911db37d6efdb8e50fb3f06139ac147bc7162c21aece79eaf72e9779f19eb5395cec3d15a7594ea70a6b373d98651d2215b210f037ea3f8a57ded74474f6fdb64a08b56af52168da70b30aee03472cd8bee5af04cad7303004a4aba464b99", 0xcb3}], 0x5, &(0x7f0000001480)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @private, @multicast1}}}], 0x20}, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001000)={{}, &(0x7f0000000040), &(0x7f0000000fc0)}, 0x20) r7 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=@base={0xa, 0x16, 0xb4, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018100000", @ANYRES32=r7, @ANYBLOB="0000000000000000790060010000000018000000000000000000000000000000950000000000000095"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001100)={{r0}, &(0x7f0000001080), &(0x7f00000010c0)}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r9) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0xa) recvmsg$unix(r8, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x40) write$cgroup_subtree(r10, &(0x7f0000000200)=ANY=[@ANYBLOB="8fedcb7907009875f37538e486dd6317ce8100036c00fe08000000000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000013c0)={r1, 0x58, &(0x7f0000001340)}, 0x10) write$cgroup_type(r10, &(0x7f00000027c0), 0x9) bpf$OBJ_GET_MAP(0x7, &(0x7f00000028c0)=@generic={&(0x7f0000002880)='./file0\x00', 0x0, 0x10}, 0x18) 2.7268533s ago: executing program 0 (id=2461): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x43, 0x0, 0x3, 0x8008a, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x6}, 0x0, 0xc8, 0x0, 0x0, 0x1, 0x2, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x60ae0}], 0x300, 0x0, 0xdb0, 0xf5ffffff}, 0x0) close(r7) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff0200000000000000000001ffaaaaaa"], 0xfdef) close(r1) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000180)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) write$cgroup_devices(r9, &(0x7f0000000140)=ANY=[@ANYBLOB], 0xffdd) 2.475653644s ago: executing program 4 (id=2463): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000000) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xfe, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x98, &(0x7f0000000500)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x93, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000840)='syzkaller\x00', 0x80, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x5d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r6) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 2.426987774s ago: executing program 0 (id=2464): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0xffffffffffffffff) syz_clone(0x40200, &(0x7f0000000000)="4571b7bda0b28b9b4646f7b60b1b150540b42bdfaf081740b32a376b039415c7380f7063cf2eb0", 0x27, &(0x7f0000000040), &(0x7f0000000240), &(0x7f00000008c0)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="8fedcb7910009875f37538e48847"], 0xfdef) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) r1 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000880), 0x12) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000003c0)}], 0x1, &(0x7f0000000500)="74d304d5c46c49bc2dec88015a5a2cf5a22d0f71513dbf6f880cc198d5fce523ca9aeee4908372190ef98b39c8db1f", 0x2f, 0x4000000}, 0x2000c041) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) 2.293458487s ago: executing program 4 (id=2465): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000100)={0x0, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1801000000081000000000000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.memory_pressure\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000040)=0x12800) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080), 0x8) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x381002, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r1}, &(0x7f0000000080), &(0x7f0000000340)=r2}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) 2.03432623s ago: executing program 1 (id=2466): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x43, 0x0, 0x3, 0x8008a, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x6}, 0x0, 0xc8, 0x0, 0x0, 0x1, 0x2, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x60ae0}], 0x300, 0x0, 0xdb0, 0xf5ffffff}, 0x0) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0x18, &(0x7f00000000c0), 0x31}, 0x7ffff000) close(r7) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff0200000000000000000001ffaaaaaa"], 0xfdef) close(r1) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) write$cgroup_devices(r9, &(0x7f0000000140)=ANY=[@ANYBLOB], 0xffdd) 1.602632716s ago: executing program 4 (id=2471): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x8, &(0x7f00000026c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xffffffffffffff7e, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='mm_page_alloc\x00', r0}, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r1, &(0x7f0000000380)=ANY=[@ANYBLOB="1e031c003c5c"], 0x2026) 1.540158557s ago: executing program 0 (id=2472): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 1.305739541s ago: executing program 0 (id=2477): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x2) (async) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xda, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x2) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde, @void, @value}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xde, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r3}, 0x10) (async) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000040)='fib6_table_lookup\x00', r3}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={0x0}, 0x18) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={0x0, 0x8}, 0x4000, 0xffffffffffffffff, 0x0, 0x0, 0x80000001, 0x0, 0x39, 0x0, 0x1fd}, 0x0, 0xa, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYRES8=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r6) (async) close(r6) bpf$PROG_LOAD(0x5, &(0x7f0000001900)={0x18, 0x11, &(0x7f0000000640)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9}, {}, {}, [@map_idx={0x18, 0x3, 0x5, 0x0, 0xf}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000480)='syzkaller\x00', 0x2, 0x1000, &(0x7f0000000880)=""/4096, 0x41100, 0x33, '\x00', 0x0, @fallback=0x2a, r4, 0x8, &(0x7f0000000700)={0x2, 0x2}, 0x8, 0x10, &(0x7f0000001880)={0x20, 0x8, 0x3, 0xfffffff9}, 0x10, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000018c0)=[r1, 0x1, r1, r1], 0x0, 0x10, 0x1, @void, @value}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7], 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) close(r6) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r8}, 0x0, 0x0}, 0x20) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r8}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r8, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r8, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r8}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='mm_lru_insertion\x00', r5}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r9}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r9}, 0x10) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r10, &(0x7f0000000180), 0x40010) 1.266617811s ago: executing program 2 (id=2479): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYRESHEX], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x18) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_pressure(r6, &(0x7f0000000240)={'full', 0x20, 0xfe43, 0x20, 0x5}, 0x2f) 1.266246391s ago: executing program 2 (id=2480): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x8982, 0x20000000) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001ac0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112b0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01ac69398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc786b409ac930c90ff90f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d858952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ef6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a308bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b6214912a517810200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09e3187a10d905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367638cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4746e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f2500579aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403502734837ff47257f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a6d072034cecc457776c5fa1f33b0203c07052c6bc314b0ac5c63bc2083c9cda0b7480e0b17854ffcc76176ce266bc698f7921b8afe798a7a5ed33ab0374455ee368fda99a0e681bf9426831b193395cb01a7332a50aac841cb7d48a1768a7640a9820631ba775a2d4f12e8e717eaaa2a6d14fee0c15f36c203dbc7c06128bec84231d43e152ef19ce027436fb4ebb9fce431b913f4817597a6f53d1626f9d1cb7b36fb18ac19547a8b20ede70c81a75686cea85dcd34408128da7cab045541bc6b9a0a79f63f2e7646356e04b977c9f47467537015240b974184be9c54b7c628ae4d97ebdb06070344468994afbaac71e5ffac2c61d9af66f9de2760a38e968a781528531c1c936a02065be48f1eee77be878873206d65bd0b1241fab9139abd7f40febe81fed3684e6b59273da01f1743c6a5df300ec59c65e8174fc2d95a62ca7b937289ad14107333007eab833a5849eb19f18ae41743dfb949377e"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xfe, 0x60000000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000700)={0xffffffffffffffff, 0xe0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0), &(0x7f0000000400), 0x0, 0x98, &(0x7f0000000500)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000540), &(0x7f0000000580), 0x8, 0x93, 0x8, 0x8, &(0x7f00000005c0)}}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000840)='syzkaller\x00', 0x80, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0xf, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x5, 0x3, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"], &(0x7f0000000000)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback=0x5d, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r7) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000040)={0x5, 0x5, &(0x7f00000001c0)=@framed={{}, [@ldst={0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1a7fbb}, @ldst={0x6, 0x0, 0x6, 0x0, 0x0, 0xfffffffffffffffe, 0xa000000}]}, &(0x7f0000000000)='syzkaller\x00', 0x5, 0xf4240, &(0x7f0000000100)=""/147, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) 1.255032352s ago: executing program 3 (id=2481): perf_event_open(&(0x7f0000000380)={0x1, 0x80, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6151, 0x61000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x15}, 0xa100, 0xc8, 0x3, 0x0, 0xfffffffffffffffd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x8000000000000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000007c5e0000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r3}, 0x18) recvmsg$unix(r0, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_pressure(r4, &(0x7f0000000240)={'full', 0x20, 0xfe43, 0x20, 0x5}, 0x2f) 1.236666882s ago: executing program 3 (id=2482): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x2}, 0xc27a, 0x200000000000000, 0x7, 0x5, 0x1, 0x200000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f00000004c0)=ANY=[@ANYBLOB="1809000000000000000000000001000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={r1, 0xffffffffffffffff}, 0x4) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r4, 0xe0, &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x7c, &(0x7f0000000540)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f0000000580), &(0x7f00000005c0), 0x8, 0xe5, 0x8, 0x8, &(0x7f0000000600)}}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.controllers\x00', 0x26e1, 0x0) close(r7) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0x20, &(0x7f0000000800)={&(0x7f0000001ac0)=""/240, 0xf0, 0x0, &(0x7f0000001bc0)=""/226, 0xe2}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000001cc0)={0x1a, 0x33, &(0x7f0000000200)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}}, @btf_id={0x18, 0x3, 0x3, 0x0, 0x4}, @alu={0x4, 0x0, 0x7, 0x0, 0xa, 0xfffffffffffffffe, 0x1}, @func={0x85, 0x0, 0x1, 0x0, 0xffffffffffffffff}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r5}}, @ldst={0x2, 0x0, 0x2, 0x0, 0xb, 0x18, 0xfffffffffffffffc}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7ff}}, @func={0x85, 0x0, 0x1, 0x0, 0x5}, @map_idx_val={0x18, 0x3, 0x6, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7}], &(0x7f0000000040)='syzkaller\x00', 0x9, 0x1000, &(0x7f00000009c0)=""/4096, 0x40f00, 0x0, '\x00', r6, @fallback=0x37, r7, 0x8, &(0x7f0000000680)={0x2, 0x2}, 0x8, 0x10, &(0x7f00000006c0)={0x0, 0xc, 0x200, 0x6271}, 0x10, r8, r0, 0x0, &(0x7f0000000940)=[r3, r3], 0x0, 0x10, 0x5, @void, @value}, 0x94) bpf$MAP_DELETE_ELEM(0x3, &(0x7f00000007c0)={r3, &(0x7f0000000780)}, 0x20) 1.164241253s ago: executing program 0 (id=2483): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x1d, &(0x7f00000001c0), 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(0xffffffffffffffff) syz_clone(0x40200, &(0x7f0000000000)="4571b7bda0b28b9b4646f7b60b1b150540b42bdfaf081740b32a376b039415c7380f7063cf2eb0", 0x27, &(0x7f0000000040), &(0x7f0000000240), &(0x7f00000008c0)) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="8fedcb7910009875f37538e48847"], 0xfdef) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x6, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x3, 0xfa, &(0x7f0000000140)=""/250, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x23) r1 = openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000880), 0x12) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000003c0)}], 0x1, &(0x7f0000000500)="74d304d5c46c49bc2dec88015a5a2cf5a22d0f71513dbf6f880cc198d5fce523ca9aeee4908372190ef98b39c8db1f", 0x2f, 0x4000000}, 0x2000c041) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0xc004743e, 0x110e22fff6) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) 1.101502004s ago: executing program 1 (id=2484): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) bpf$MAP_CREATE(0x300000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000004000000410000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x25, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x96, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="030011351b61c416486bb634a6a476493ce8e48e272e3677f3ab167f8695fa92608c2d09b75f54ff837b9ebe92e63de418d5e5ffed1cbede26874daadf783d9d75c36eaaaa55ef36620000000000f8000000", @ANYRES32, @ANYBLOB="0500"/20, @ANYRES32=r0, @ANYRES32, @ANYBLOB="01000000030000000100"/28], 0x50) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0x12a0, 0xa, 0x77ab69fc, 0x3, r2, 0x8, '\x00', r0, 0xffffffffffffffff, 0x5, 0x3, 0x4, 0x9, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="7a1ae1394a080f1f129fe422ada32ddc785071a42cb14dd4beaec35e1d1722c14125e738efa54a5482163265f798f9acb81f3b5c282b9eecd148728fed5cbbfba490563428ff9c6370be67ecffd02071b3df21dfbf2d320c2b6d98a187", @ANYRES64=r3, @ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7f, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) close(r6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x121, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) sendmsg$inet(r7, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010100)={0xffffffffffffffff, &(0x7f00000102c0), &(0x7f0000010440)=""/198}, 0x20) mkdirat$cgroup(r4, &(0x7f0000000b80)='syz0\x00', 0x1ff) 895.384377ms ago: executing program 1 (id=2485): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r4 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000001080)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000040)='!=[\\\\}#\x00') r6 = gettid() syz_open_procfs$namespace(r6, &(0x7f0000000500)='ns/cgroup\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000540)='(pu&00\t(|') bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x12, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x10001}, [@ldst={0x1, 0x0, 0x4, 0x2, 0x1, 0x20}]}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xb269, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r12, 0x1, 0x10, 0x0, 0x0) recvmsg(r11, &(0x7f0000000080)={0xfffffffffffffffe}, 0xf7481d501685431e) sendmsg$inet(r12, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r9}, 0x57) socketpair(0x1, 0x1, 0x8000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000cc0)={r10, 0x0, 0x0}, 0x10) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x17, 0x1000, 0x1, 0x8, 0x10420, r8, 0x6, '\x00', 0x0, r2, 0x2, 0x1, 0x0, 0x0, @void, @value, @value=r7}, 0x50) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000000)={r13, &(0x7f0000000040), &(0x7f0000001880)=""/56}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) 859.898277ms ago: executing program 3 (id=2486): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000500)='mm_lru_activate\x00', r2}, 0x10) write$cgroup_int(r1, &(0x7f0000000200), 0x43451) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000004c0)='memory.events\x00', 0x100002, 0x0) write$cgroup_int(r3, &(0x7f0000000200), 0x43451) 857.980608ms ago: executing program 4 (id=2487): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) 775.270329ms ago: executing program 4 (id=2488): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, 0x0, 0x0, 0x0, 0x0, 0xf5ffffff}, 0x0) sendmsg$tipc(r0, &(0x7f0000000240)={0x0, 0x18, &(0x7f00000000c0), 0x31}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000071123900000000009500000000000000410d5a538f0606ae05b9b78481dbf5f42f0f64ec6d31765d125c077b9005af5b3c7b1d0355d1db0e0786f3b61b90ed031cccae5b4ec4ec1e93dbb0d9a9c63cdba29fd41cee1fba5562e7367138c333ba61f1947ffca82396198b2a3bfb37ab085b9c094e99e7a174196dbefa6b2df853d464ea2a6962e95af269a6c64b2b8b4ca4acf21186ca07454e84bc05ea7807501a66e7719b27e15708bd16eb1c0c108b211532bca3b41f0118bf0a4523640a32d69b20636c5df2a2b8a706b28bd8ac3eb514b012"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xb2, 0x2, 0x0, 0x0, 0x0, 0x4, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xf, 0x2}, 0xc27a, 0x200000000000000, 0x7, 0x5, 0x1, 0x200000, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x8) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x1, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3a66505}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000c40)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001180)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r6, &(0x7f0000000100)='cpuset.cpus\x00', 0x2, 0x0) 770.899169ms ago: executing program 3 (id=2489): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@enum, @struct={0x0, 0x0, 0x0, 0x4, 0x1, 0xffff}]}}, 0x0, 0x32, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) (fail_nth: 5) 582.443041ms ago: executing program 2 (id=2490): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYRESHEX], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f0000000740)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x18) recvmsg$unix(r2, &(0x7f0000001ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_pressure(r6, &(0x7f0000000240)={'full', 0x20, 0xfe43, 0x20, 0x5}, 0x2f) 375.519734ms ago: executing program 2 (id=2491): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x200000000000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x1, 0x0, 0x544}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 324.484775ms ago: executing program 4 (id=2492): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000004843eb3376ab370215b34d5b645a80d41e0f5429c0e0505814d6b969a49c565ffbb01f4159ca8aff0d42bc7fbf16efd266c22eb3c2eca361407294bb80d0c945ef3cd62802db2b24c32c9a79da1ef1d0c594d577fa4ffd0239ad22c6e1e5efd71d35a49216fedd0fa51d9d2a4fee6fd7bb2482693116ba4e68a6efd5366b3c95c0e5a1f0ec8f157992cbf1cabee713b744b43e0786454fad2aaf309c96ce5000000000000000000000000000002563cc6790f42992820ac96a630ad425d1495521ad89f916ad7ac12abcd3b6e61171eae0fe3608bc0a0c1342e89f35eb95805578d465500cf062d9cc4c383c29c8222f3c677d6f59434c9063c9203d5399dcca1071ebb39f792946e29fbef113ed2194b980f38915a12afaf06f717a70e765014eb76749421ef0393242b1f2617baef25fada9a7bb5aabd6bfdacfc6c31df81e74c7d834c80f83572b4710301f0d3ee07f68bd136069d745154881f0fb081d8e22874d55897da2e5272b205be9d5e24e902c3d56a2b0c4063b90736dde83fe842ad37ad99d8ba0a506a6c418ba450dda7670a7c8dfdb7e0c4ca609236f68af9945630fd47391d075789ff9cc806dc2e586d87f9e25b2edabafe6b549f65a257a92e29ac392c47b7e1228193ac02cac052b15cf170e460a4b16d850c7afa6aa6e3b677b6dadc521645d8a52aa752240da342fc98fc8fcc2b6ca9f076963298af7ca2bd207281f788336da5248c4f6a8e20f470df"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r4 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000001080)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x68, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000040)='!=[\\\\}#\x00') r6 = gettid() syz_open_procfs$namespace(r6, &(0x7f0000000500)='ns/cgroup\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000540)='(pu&00\t(|') bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x12, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x801, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={0x0}, 0x18) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xfffffffffffffffe, 0xffffffffffffffff, 0x0) r8 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x10001}, [@ldst={0x1, 0x0, 0x4, 0x2, 0x1, 0x20}]}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xb269, @void, @value}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r12, 0x1, 0x10, 0x0, 0x0) recvmsg(r11, &(0x7f0000000080)={0xfffffffffffffffe, 0x80, &(0x7f0000000000)=[{&(0x7f0000000280)=""/224}], 0x2}, 0xf7481d501685431e) sendmsg$inet(r12, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000240)={r9}, 0x57) socketpair(0x1, 0x1, 0x8000, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000cc0)={r10, 0xe0, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000880)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f00000008c0)=[0x0, 0x0, 0x0], &(0x7f0000000900)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0xdd, &(0x7f0000000940)=[{}, {}, {}], 0x18, 0x10, &(0x7f0000000980), &(0x7f00000009c0), 0x8, 0x5c, 0x8, 0x8, &(0x7f0000000ac0)}}, 0x10) r14 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x17, 0x1000, 0x1, 0x8, 0x10420, r8, 0x6, '\x00', r13, r2, 0x2, 0x1, 0x0, 0x0, @void, @value, @value=r7}, 0x50) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000000000)={r14, &(0x7f0000000040), &(0x7f0000001880)=""/56}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) 303.046825ms ago: executing program 3 (id=2493): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 265.669486ms ago: executing program 3 (id=2494): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0xc48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000004000000e27f000001"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0), &(0x7f0000000380), 0x5, r0}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x0, 0x0, 0x43, 0x0, 0x3, 0x8008a, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x6}, 0x0, 0xc8, 0x0, 0x0, 0x1, 0x2, 0xffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x60ae0}], 0x300, 0x0, 0xdb0, 0xf5ffffff}, 0x0) sendmsg$tipc(r7, &(0x7f0000000240)={0x0, 0x18, &(0x7f00000000c0), 0x31}, 0x7ffff000) close(r7) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff0200000000000000000001ffaaaaaa"], 0xfdef) close(r1) r9 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r10, 0x8914, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00'}, 0x10) write$cgroup_devices(r9, &(0x7f0000000140)=ANY=[@ANYBLOB], 0xffdd) 252.936146ms ago: executing program 2 (id=2495): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x18, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xe, 0x4, 0x4, 0x9, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x9, 0x8, 0x4, 0x4009, 0xa, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 199.159627ms ago: executing program 0 (id=2496): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={0x0}, 0x18) bpf$MAP_CREATE(0x300000000000000, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000004000000410000000000", @ANYRES32=0x1, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000005c0)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000004c0)=[0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0xa, &(0x7f00000006c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x25, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0x96, 0x8, 0x8, &(0x7f0000000680)}}, 0x10) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000900)=ANY=[@ANYBLOB="030011351b61c416486bb634a6a476493ce8e48e272e3677f3ab167f8695fa92608c2d09b75f54ff837b9ebe92e63de418d5e5ffed1cbede26874daadf783d9d75c36eaaaa55ef36620000000000f8000000", @ANYRES32, @ANYBLOB="0500"/20, @ANYRES32=r0, @ANYRES32, @ANYBLOB="01000000030000000100"/28], 0x50) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000600)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x80260, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000, 0x3, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x8000000000000000, 0x8000}, 0x4105, 0x0, 0x3}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz0\x00', 0x1ff) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@bloom_filter={0x1e, 0x12a0, 0xa, 0x77ab69fc, 0x3, r2, 0x8, '\x00', r0, 0xffffffffffffffff, 0x5, 0x3, 0x4, 0x9, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="7a1ae1394a080f1f129fe422ada32ddc785071a42cb14dd4beaec35e1d1722c14125e738efa54a5482163265f798f9acb81f3b5c282b9eecd148728fed5cbbfba490563428ff9c6370be67ecffd02071b3df21dfbf2d320c2b6d98a187", @ANYRES64=r3, @ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7f, @void, @value}, 0x94) bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000002a00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001ac0)={0x0, 0x0, 0x0}, 0x0) close(r6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x121, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) sendmsg$inet(r7, &(0x7f0000000b40)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000010100)={0xffffffffffffffff, &(0x7f00000102c0), &(0x7f0000010440)=""/198}, 0x20) mkdirat$cgroup(r4, &(0x7f0000000b80)='syz0\x00', 0x1ff) 110.753388ms ago: executing program 1 (id=2497): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0xfffffffe, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000140)={0x11, 0x8, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x1f) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000640), 0x8) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r4}, 0x10) bpf$MAP_CREATE(0x300000000000000, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x1400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x2114, 0xc8, 0xffffffff}, 0x0, 0x80000000, 0xffffffffffffffff, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r5, 0x4030582a, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) write$cgroup_pid(r6, 0x0, 0x0) syz_clone(0xc2002000, 0x0, 0x0, 0x0, 0x0, 0x0) syz_clone(0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN_LIVE(0xa, &(0x7f00000001c0)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x1) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 0s ago: executing program 2 (id=2498): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.10.21' (ED25519) to the list of known hosts. [ 20.875590][ T24] audit: type=1400 audit(1750133965.690:64): avc: denied { mounton } for pid=267 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 20.876919][ T267] cgroup: Unknown subsys name 'net' [ 20.898368][ T24] audit: type=1400 audit(1750133965.690:65): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.925613][ T24] audit: type=1400 audit(1750133965.720:66): avc: denied { unmount } for pid=267 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 20.926010][ T267] cgroup: Unknown subsys name 'devices' [ 21.128602][ T267] cgroup: Unknown subsys name 'hugetlb' [ 21.134352][ T267] cgroup: Unknown subsys name 'rlimit' [ 21.275347][ T24] audit: type=1400 audit(1750133966.090:67): avc: denied { setattr } for pid=267 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=253 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 21.298502][ T24] audit: type=1400 audit(1750133966.090:68): avc: denied { mounton } for pid=267 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 21.314455][ T269] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 21.323387][ T24] audit: type=1400 audit(1750133966.090:69): avc: denied { mount } for pid=267 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 21.354881][ T24] audit: type=1400 audit(1750133966.160:70): avc: denied { relabelto } for pid=269 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.380399][ T24] audit: type=1400 audit(1750133966.160:71): avc: denied { write } for pid=269 comm="mkswap" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.380426][ T267] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 21.406013][ T24] audit: type=1400 audit(1750133966.190:72): avc: denied { read } for pid=267 comm="syz-executor" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 21.406030][ T24] audit: type=1400 audit(1750133966.190:73): avc: denied { open } for pid=267 comm="syz-executor" path="/root/swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 22.179217][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.186301][ T275] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.193721][ T275] device bridge_slave_0 entered promiscuous mode [ 22.201485][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.208628][ T275] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.216052][ T275] device bridge_slave_1 entered promiscuous mode [ 22.289501][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.296541][ T276] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.304136][ T276] device bridge_slave_0 entered promiscuous mode [ 22.311266][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.318329][ T276] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.325704][ T276] device bridge_slave_1 entered promiscuous mode [ 22.339280][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.346326][ T277] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.353754][ T277] device bridge_slave_0 entered promiscuous mode [ 22.363147][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.370282][ T277] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.377774][ T277] device bridge_slave_1 entered promiscuous mode [ 22.441251][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.448453][ T279] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.455785][ T279] device bridge_slave_0 entered promiscuous mode [ 22.462684][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.469843][ T279] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.477434][ T279] device bridge_slave_1 entered promiscuous mode [ 22.483942][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.491107][ T278] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.498496][ T278] device bridge_slave_0 entered promiscuous mode [ 22.507591][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.514639][ T278] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.522057][ T278] device bridge_slave_1 entered promiscuous mode [ 22.631195][ T275] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.638281][ T275] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.645537][ T275] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.652617][ T275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.675136][ T278] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.682205][ T278] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.689492][ T278] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.696519][ T278] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.707956][ T276] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.715009][ T276] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.722284][ T276] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.729324][ T276] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.740037][ T279] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.747098][ T279] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.754339][ T279] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.761383][ T279] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.772498][ T277] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.779553][ T277] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.786826][ T277] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.793851][ T277] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.829745][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.838501][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.847240][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.854389][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.861733][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.868912][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.876104][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.883506][ T112] bridge0: port 1(bridge_slave_0) entered disabled state [ 22.890705][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.897927][ T112] bridge0: port 2(bridge_slave_1) entered disabled state [ 22.905560][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 22.913047][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.938155][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.945871][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 22.953479][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 22.962097][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 22.969164][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 22.977064][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 22.985199][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 22.992239][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 22.999759][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.007947][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.014961][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.026952][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.034948][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.052814][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.061092][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.068151][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.075479][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.084339][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.092308][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.111325][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.119684][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.126763][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.134074][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.142668][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.149749][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.157270][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.165171][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 23.172642][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.180647][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.203074][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.211757][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.219908][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.228989][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.236349][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 23.245023][ T112] bridge0: port 1(bridge_slave_0) entered blocking state [ 23.252091][ T112] bridge0: port 1(bridge_slave_0) entered forwarding state [ 23.259720][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 23.267912][ T112] bridge0: port 2(bridge_slave_1) entered blocking state [ 23.274929][ T112] bridge0: port 2(bridge_slave_1) entered forwarding state [ 23.282295][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 23.290346][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.299749][ T276] device veth0_vlan entered promiscuous mode [ 23.312844][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 23.321117][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 23.339186][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.347566][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.355838][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.363888][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.372259][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.379865][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.388057][ T278] device veth0_vlan entered promiscuous mode [ 23.397869][ T276] device veth1_macvtap entered promiscuous mode [ 23.409784][ T275] device veth0_vlan entered promiscuous mode [ 23.416908][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.425132][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.433420][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.441513][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.450017][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.458545][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.466364][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.474439][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.482908][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.491348][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.499242][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.512191][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.520223][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.528384][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.536579][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.545338][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.552924][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.561598][ T277] device veth0_vlan entered promiscuous mode [ 23.574284][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.582563][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.590747][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.599141][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.607611][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 23.615892][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 23.627734][ T278] device veth1_macvtap entered promiscuous mode [ 23.636567][ T279] device veth0_vlan entered promiscuous mode [ 23.644649][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.652671][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 23.660991][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 23.669650][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 23.677321][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 23.693197][ T275] device veth1_macvtap entered promiscuous mode [ 23.705827][ T276] request_module fs-gadgetfs succeeded, but still no fs? [ 23.706359][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.721591][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.730351][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.738711][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.747046][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.754591][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.762783][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.773173][ T279] device veth1_macvtap entered promiscuous mode [ 23.781884][ T276] cgroup: cgroup: disabling cgroup2 socket matching due to net_prio or net_cls activation [ 23.784071][ T277] device veth1_macvtap entered promiscuous mode [ 23.801012][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.814211][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.816708][ C0] hrtimer: interrupt took 31357 ns [ 23.829306][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.838137][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 23.846330][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 23.855175][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 23.936926][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.948287][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 23.965879][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 23.974701][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 23.983414][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 23.992019][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.000789][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.009769][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.038388][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 24.046999][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 24.056355][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 24.065384][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 24.189398][ T309] device syzkaller0 entered promiscuous mode [ 25.399998][ T337] €Â0: renamed from pim6reg1 [ 27.812671][ T397] device syzkaller0 entered promiscuous mode [ 28.641939][ T416] €Â0: renamed from pim6reg1 [ 29.521468][ T429] €Â0: renamed from pim6reg1 [ 30.389680][ T447] device syzkaller0 entered promiscuous mode [ 30.621216][ T457] €Â0: renamed from pim6reg1 [ 31.543397][ T488] ------------[ cut here ]------------ [ 31.642604][ T488] trace type BPF program uses run-time allocation [ 31.822001][ T488] WARNING: CPU: 1 PID: 488 at kernel/bpf/verifier.c:10496 check_map_prog_compatibility+0x5d6/0x740 [ 31.906920][ T488] Modules linked in: [ 31.966807][ T488] CPU: 1 PID: 488 Comm: syz.1.68 Not tainted 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 32.010675][ T488] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 32.048822][ T498] €Â0: renamed from pim6reg1 [ 32.096166][ T488] RIP: 0010:check_map_prog_compatibility+0x5d6/0x740 [ 32.156785][ T488] Code: 85 e9 14 fe ff ff e8 89 f7 ef ff 31 c0 e9 15 fe ff ff e8 7d f7 ef ff c6 05 43 9b 2c 05 01 48 c7 c7 80 6b 05 85 e8 2a 5f f8 02 <0f> 0b e9 85 fc ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c a3 fa ff [ 32.246904][ T488] RSP: 0018:ffffc90000e47468 EFLAGS: 00010246 [ 32.291038][ T488] RAX: 6d930109b4510f00 RBX: 0000000000000001 RCX: 0000000000080000 [ 32.426842][ T488] RDX: ffffc90001d4d000 RSI: 0000000000001f0c RDI: 0000000000001f0d [ 32.496794][ T488] RBP: ffffc90000e474b0 R08: dffffc0000000000 R09: ffffed103ee2a5f8 [ 32.568646][ T488] R10: ffffed103ee2a5f8 R11: 1ffff1103ee2a5f7 R12: ffff888127abc000 [ 32.651250][ T488] R13: 0000000000000011 R14: dffffc0000000000 R15: ffff888116d14000 [ 32.666768][ T488] FS: 00007fb6ac2ad6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 32.676086][ T488] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 32.686929][ T488] CR2: 00005555594cf4a8 CR3: 0000000113387000 CR4: 00000000003506b0 [ 32.708247][ T488] DR0: 0000200000000300 DR1: 0000000000000000 DR2: 0000000000000000 [ 32.766856][ T488] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 32.774887][ T488] Call Trace: [ 32.827465][ T488] ? __fdget+0x1a1/0x230 [ 32.859285][ T488] resolve_pseudo_ldimm64+0x526/0x1020 [ 32.864809][ T488] ? bpf_check+0xd720/0xd720 [ 32.966818][ T488] ? kvmalloc_node+0x88/0x130 [ 32.971566][ T488] bpf_check+0x8db4/0xd720 [ 32.976005][ T488] ? bpf_get_btf_vmlinux+0x60/0x60 [ 32.994351][ T516] €Â0: renamed from pim6reg1 [ 33.046880][ T488] ? is_bpf_text_address+0x177/0x190 [ 33.052237][ T488] ? selinux_bpf_prog_alloc+0x51/0x140 [ 33.136847][ T488] ? __kernel_text_address+0xa0/0x100 [ 33.176834][ T488] ? unwind_get_return_address+0x4d/0x90 [ 33.182537][ T488] ? stack_trace_save+0xe0/0xe0 [ 33.202402][ T488] ? arch_stack_walk+0xee/0x140 [ 33.216869][ T488] ? stack_trace_save+0x98/0xe0 [ 33.221873][ T488] ? stack_trace_snprint+0xf0/0xf0 [ 33.294493][ T488] ? __kasan_slab_alloc+0x69/0xf0 [ 33.313138][ T488] ? pcpu_block_update+0x451/0x900 [ 33.349296][ T488] ? selinux_bpf_prog_alloc+0x51/0x140 [ 33.354809][ T488] ? __kasan_kmalloc+0xec/0x110 [ 33.437439][ T488] ? __kasan_kmalloc+0xda/0x110 [ 33.442346][ T488] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 33.511999][ T488] ? selinux_bpf_prog_alloc+0x51/0x140 [ 33.546760][ T488] ? security_bpf_prog_alloc+0x62/0x90 [ 33.599496][ T488] ? bpf_prog_load+0x949/0x1420 [ 33.604495][ T488] ? __se_sys_bpf+0x442/0x680 [ 33.640143][ T488] ? __x64_sys_bpf+0x7b/0x90 [ 33.644948][ T488] ? do_syscall_64+0x31/0x40 [ 33.657284][ T488] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 33.667165][ T488] ? memset+0x35/0x40 [ 33.671194][ T488] ? bpf_obj_name_cpy+0x193/0x1e0 [ 33.756934][ T488] bpf_prog_load+0xf5a/0x1420 [ 33.822002][ T488] ? map_freeze+0x320/0x320 [ 33.887483][ T488] ? selinux_bpf+0xc7/0xf0 [ 33.891948][ T488] ? security_bpf+0x82/0xa0 [ 33.896476][ T488] __se_sys_bpf+0x442/0x680 [ 33.910347][ T488] ? __x64_sys_bpf+0x90/0x90 [ 33.915064][ T488] ? fpu__clear_all+0x20/0x20 [ 33.923009][ T488] __x64_sys_bpf+0x7b/0x90 [ 33.927738][ T488] do_syscall_64+0x31/0x40 [ 33.932267][ T488] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 33.938447][ T488] RIP: 0033:0x7fb6adc65929 [ 33.942950][ T488] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 33.965637][ T539] device syzkaller0 entered promiscuous mode [ 34.000266][ T488] RSP: 002b:00007fb6ac2ad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 34.033051][ T488] RAX: ffffffffffffffda RBX: 00007fb6ade8d080 RCX: 00007fb6adc65929 [ 34.081910][ T488] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 34.111263][ T488] RBP: 00007fb6adce7b39 R08: 0000000000000000 R09: 0000000000000000 [ 34.127359][ T488] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 34.145612][ T488] R13: 0000000000000000 R14: 00007fb6ade8d080 R15: 00007ffdc1b7b888 [ 34.165831][ T488] ---[ end trace f4c3cab2e414d360 ]--- [ 35.641377][ T579] device syzkaller0 entered promiscuous mode [ 35.648328][ T584] syz.0.104[584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.648384][ T584] syz.0.104[584] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 35.862202][ T594] device syzkaller0 entered promiscuous mode [ 36.780874][ T623] €Â0: renamed from pim6reg1 [ 36.908008][ T626] syz.1.120[626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 36.908072][ T626] syz.1.120[626] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 37.971164][ T641] device syzkaller0 entered promiscuous mode [ 38.182655][ T658] €Â0: renamed from pim6reg1 [ 38.792764][ T676] €Â0: renamed from pim6reg1 [ 39.178655][ T693] device syzkaller0 entered promiscuous mode [ 39.202052][ T694] device syzkaller0 entered promiscuous mode [ 39.476454][ T24] kauditd_printk_skb: 42 callbacks suppressed [ 39.476465][ T24] audit: type=1400 audit(1750133984.290:116): avc: denied { read } for pid=701 comm="syz.1.148" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 39.535128][ T24] audit: type=1400 audit(1750133984.350:117): avc: denied { create } for pid=698 comm="syz.3.147" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 40.532722][ T723] device syzkaller0 entered promiscuous mode [ 40.779810][ T725] device syzkaller0 entered promiscuous mode [ 42.508287][ T773] device syzkaller0 entered promiscuous mode [ 42.558867][ T783] syz.0.178[783] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 42.558928][ T783] syz.0.178[783] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.577756][ T818] syz.3.192[818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 43.674212][ T818] syz.3.192[818] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.492457][ T848] syz.4.205[848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.555777][ T848] syz.4.205[848] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 44.622217][ T850] €Â0: renamed from pim6reg1 [ 44.793156][ T855] €Â0: renamed from pim6reg1 [ 46.544417][ T908] device syzkaller0 entered promiscuous mode [ 46.773178][ T916] device syzkaller0 entered promiscuous mode [ 47.043176][ T929] €Â0: renamed from pim6reg1 [ 47.723075][ T955] device syzkaller0 entered promiscuous mode [ 48.884771][ T981] €Â0: renamed from pim6reg1 [ 49.005485][ T986] €Â0: renamed from pim6reg1 [ 50.194582][ T1001] device syzkaller0 entered promiscuous mode [ 50.843742][ T1013] €Â0: renamed from pim6reg1 [ 51.757279][ T1040] device syzkaller0 entered promiscuous mode [ 53.078199][ T1083] device syzkaller0 entered promiscuous mode [ 54.204012][ T1114] €Â0: renamed from pim6reg1 [ 55.562612][ T1161] €Â0: renamed from pim6reg1 [ 56.207625][ T1169] device syzkaller0 entered promiscuous mode [ 57.419900][ T1183] device syzkaller0 entered promiscuous mode [ 57.431150][ T1189] €Â0: renamed from pim6reg1 [ 57.481384][ T1190] device syzkaller0 entered promiscuous mode [ 57.717605][ T1195] €Â0: renamed from pim6reg1 [ 58.239046][ T1203] €Â0: renamed from pim6reg1 [ 59.985141][ T1239] syz.1.365[1239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 59.985196][ T1239] syz.1.365[1239] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.117161][ T1241] €Â0: renamed from pim6reg1 [ 60.394771][ T1253] €Â0: renamed from pim6reg1 [ 60.938452][ T1269] syz.1.376[1269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 60.938516][ T1269] syz.1.376[1269] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 61.163180][ T1272] device syzkaller0 entered promiscuous mode [ 62.077192][ T1288] €Â0: renamed from pim6reg1 [ 62.148792][ T1299] syz.1.387[1299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 62.148852][ T1299] syz.1.387[1299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.098119][ T1323] syz.2.398[1323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.140442][ T1323] syz.2.398[1323] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 63.320598][ T1328] €Â0: renamed from pim6reg1 [ 64.002034][ T1332] device syzkaller0 entered promiscuous mode [ 64.972214][ T1375] device syzkaller0 entered promiscuous mode [ 65.196624][ T1380] device syzkaller0 entered promiscuous mode [ 66.858183][ T1411] device syzkaller0 entered promiscuous mode [ 66.963354][ T1423] €Â0: renamed from pim6reg1 [ 67.138429][ T1432] €Â0: renamed from pim6reg1 [ 68.626167][ T1473] syz.0.456[1473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 68.626226][ T1473] syz.0.456[1473] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 69.425439][ T1491] device syzkaller0 entered promiscuous mode [ 69.812314][ T24] audit: type=1400 audit(1750134014.630:118): avc: denied { create } for pid=1495 comm="syz.4.467" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 69.976112][ T24] audit: type=1400 audit(1750134014.790:119): avc: denied { create } for pid=1507 comm="syz.4.470" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 70.117664][ T1512] device pim6reg1 entered promiscuous mode [ 70.938375][ T1528] €Â0: renamed from pim6reg1 [ 71.684213][ T1550] cgroup: syz.4.488 (1550) created nested cgroup for controller "memory" which has incomplete hierarchy support. Nested cgroups may change behavior in the future. [ 71.828839][ T1550] cgroup: "memory" requires setting use_hierarchy to 1 on the root [ 72.085140][ T1559] device syzkaller0 entered promiscuous mode [ 73.767487][ T1606] geneve1: tun_chr_ioctl cmd 35108 [ 73.810284][ T1609] device sit0 entered promiscuous mode [ 74.137624][ T24] audit: type=1400 audit(1750134018.960:120): avc: denied { ioctl } for pid=1615 comm="syz.0.508" path="socket:[20792]" dev="sockfs" ino=20792 ioctlcmd=0x8912 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 74.278697][ T1625] FAULT_INJECTION: forcing a failure. [ 74.278697][ T1625] name failslab, interval 1, probability 0, space 0, times 1 [ 74.323853][ T1625] CPU: 1 PID: 1625 Comm: syz.2.509 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 74.335090][ T1625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 74.345169][ T1625] Call Trace: [ 74.348500][ T1625] __dump_stack+0x21/0x24 [ 74.352835][ T1625] dump_stack_lvl+0x169/0x1d8 [ 74.357522][ T1625] ? thaw_kernel_threads+0x220/0x220 [ 74.362812][ T1625] ? show_regs_print_info+0x18/0x18 [ 74.368012][ T1625] ? proc_fail_nth_read+0x210/0x210 [ 74.373226][ T1625] dump_stack+0x15/0x1c [ 74.377390][ T1625] should_fail+0x3c1/0x510 [ 74.381809][ T1625] ? map_get_next_key+0x274/0x4c0 [ 74.386835][ T1625] __should_failslab+0xa4/0xe0 [ 74.391605][ T1625] should_failslab+0x9/0x20 [ 74.396109][ T1625] __kmalloc+0x60/0x330 [ 74.400271][ T1625] ? __fdget+0x1a1/0x230 [ 74.404517][ T1625] map_get_next_key+0x274/0x4c0 [ 74.409368][ T1625] __se_sys_bpf+0x31d/0x680 [ 74.413874][ T1625] ? __x64_sys_bpf+0x90/0x90 [ 74.418482][ T1625] ? fpu__clear_all+0x20/0x20 [ 74.423174][ T1625] __x64_sys_bpf+0x7b/0x90 [ 74.427591][ T1625] do_syscall_64+0x31/0x40 [ 74.432015][ T1625] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 74.437916][ T1625] RIP: 0033:0x7f71c50d9929 [ 74.442343][ T1625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 74.461946][ T1625] RSP: 002b:00007f71c3742038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 74.470378][ T1625] RAX: ffffffffffffffda RBX: 00007f71c5300fa0 RCX: 00007f71c50d9929 [ 74.478355][ T1625] RDX: 0000000000000020 RSI: 0000200000000300 RDI: 0000000000000004 [ 74.486332][ T1625] RBP: 00007f71c3742090 R08: 0000000000000000 R09: 0000000000000000 [ 74.494317][ T1625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 74.502298][ T1625] R13: 0000000000000000 R14: 00007f71c5300fa0 R15: 00007ffee1c4e1f8 [ 76.752235][ T1654] €Â0: renamed from pim6reg1 [ 76.856266][ T1656] €Â0: renamed from pim6reg1 [ 77.055853][ T24] audit: type=1400 audit(1750134021.860:121): avc: denied { create } for pid=1673 comm="syz.4.529" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 77.797118][ T1695] device veth0_vlan left promiscuous mode [ 77.861908][ T1695] device veth0_vlan entered promiscuous mode [ 77.951740][ T1704] device syzkaller0 entered promiscuous mode [ 78.087798][ T1710] device veth0_vlan left promiscuous mode [ 78.093619][ T24] audit: type=1400 audit(1750134022.910:122): avc: denied { write } for pid=1713 comm="syz.0.544" name="cgroup.subtree_control" dev="cgroup2" ino=221 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 78.118311][ T1710] device veth0_vlan entered promiscuous mode [ 78.138757][ T24] audit: type=1400 audit(1750134022.910:123): avc: denied { open } for pid=1713 comm="syz.0.544" path="" dev="cgroup2" ino=221 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 78.301707][ T1722] device veth0_vlan left promiscuous mode [ 78.312973][ T1722] device veth0_vlan entered promiscuous mode [ 78.329498][ T1724] device syzkaller0 entered promiscuous mode [ 78.603284][ T1732] device syzkaller0 entered promiscuous mode [ 79.453505][ T1756] FAULT_INJECTION: forcing a failure. [ 79.453505][ T1756] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 79.566989][ T1756] CPU: 0 PID: 1756 Comm: syz.2.560 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 79.578225][ T1756] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 79.588291][ T1756] Call Trace: [ 79.591589][ T1756] __dump_stack+0x21/0x24 [ 79.595929][ T1756] dump_stack_lvl+0x169/0x1d8 [ 79.600611][ T1756] ? thaw_kernel_threads+0x220/0x220 [ 79.605899][ T1756] ? show_regs_print_info+0x18/0x18 [ 79.611108][ T1756] ? __kasan_check_write+0x14/0x20 [ 79.616220][ T1756] ? skb_set_owner_w+0x229/0x320 [ 79.621164][ T1756] dump_stack+0x15/0x1c [ 79.625325][ T1756] should_fail+0x3c1/0x510 [ 79.629766][ T1756] should_fail_usercopy+0x1a/0x20 [ 79.634796][ T1756] copy_page_from_iter+0x381/0x6c0 [ 79.639912][ T1756] skb_copy_datagram_from_iter+0x2d0/0x6b0 [ 79.645843][ T1756] unix_stream_sendmsg+0x729/0xbd0 [ 79.650965][ T1756] ? unix_show_fdinfo+0xa0/0xa0 [ 79.655845][ T1756] ? check_stack_object+0x106/0x140 [ 79.661050][ T1756] ? security_socket_sendmsg+0x82/0xa0 [ 79.666508][ T1756] ? unix_show_fdinfo+0xa0/0xa0 [ 79.671387][ T1756] ____sys_sendmsg+0x5a2/0x8c0 [ 79.676171][ T1756] ? __sys_sendmsg_sock+0x40/0x40 [ 79.681204][ T1756] ? import_iovec+0x7c/0xb0 [ 79.685716][ T1756] ___sys_sendmsg+0x1f0/0x260 [ 79.690407][ T1756] ? __sys_sendmsg+0x250/0x250 [ 79.695171][ T1756] ? rw_verify_area+0x1c0/0x360 [ 79.700036][ T1756] ? __fdget+0x1a1/0x230 [ 79.704282][ T1756] __x64_sys_sendmsg+0x1e2/0x2a0 [ 79.709230][ T1756] ? fput+0x1a/0x20 [ 79.713055][ T1756] ? ___sys_sendmsg+0x260/0x260 [ 79.717908][ T1756] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 79.724003][ T1756] do_syscall_64+0x31/0x40 [ 79.728435][ T1756] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 79.734332][ T1756] RIP: 0033:0x7f71c50d9929 [ 79.738753][ T1756] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 79.758372][ T1756] RSP: 002b:00007f71c3742038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 79.766803][ T1756] RAX: ffffffffffffffda RBX: 00007f71c5300fa0 RCX: 00007f71c50d9929 [ 79.774785][ T1756] RDX: 0000000000000000 RSI: 0000200000001580 RDI: 0000000000000003 [ 79.782769][ T1756] RBP: 00007f71c3742090 R08: 0000000000000000 R09: 0000000000000000 [ 79.790746][ T1756] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 79.798730][ T1756] R13: 0000000000000000 R14: 00007f71c5300fa0 R15: 00007ffee1c4e1f8 [ 79.926077][ T1752] device syzkaller0 entered promiscuous mode [ 80.203428][ T1766] €Â0: renamed from pim6reg1 [ 80.273750][ T1764] €Â0: renamed from pim6reg1 [ 80.788672][ T24] audit: type=1400 audit(1750134025.610:124): avc: denied { create } for pid=1782 comm="syz.4.571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 81.660477][ T1799] syz.3.576[1799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.660558][ T1799] syz.3.576[1799] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 81.672390][ T1793] €Â0: renamed from pim6reg1 [ 82.458772][ T1811] syz.0.581[1811] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 82.458830][ T1811] syz.0.581[1811] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 83.390557][ T1826] FAULT_INJECTION: forcing a failure. [ 83.390557][ T1826] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 83.706787][ T1826] CPU: 0 PID: 1826 Comm: syz.1.586 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 83.718134][ T1826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 83.728286][ T1826] Call Trace: [ 83.731578][ T1826] __dump_stack+0x21/0x24 [ 83.735895][ T1826] dump_stack_lvl+0x169/0x1d8 [ 83.740561][ T1826] ? show_regs_print_info+0x18/0x18 [ 83.745743][ T1826] dump_stack+0x15/0x1c [ 83.749918][ T1826] should_fail+0x3c1/0x510 [ 83.754320][ T1826] should_fail_alloc_page+0x4f/0x60 [ 83.759500][ T1826] __alloc_pages_nodemask+0x109/0x5f0 [ 83.764863][ T1826] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 83.770396][ T1826] ? _raw_spin_trylock_bh+0x130/0x130 [ 83.775753][ T1826] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 83.781897][ T1826] __get_free_pages+0xe/0x30 [ 83.786474][ T1826] kasan_populate_vmalloc_pte+0x29/0x120 [ 83.792095][ T1826] __apply_to_page_range+0x74e/0x9e0 [ 83.797379][ T1826] ? kasan_populate_vmalloc+0x70/0x70 [ 83.802735][ T1826] ? kasan_populate_vmalloc+0x70/0x70 [ 83.808091][ T1826] apply_to_page_range+0x3b/0x50 [ 83.813045][ T1826] kasan_populate_vmalloc+0x60/0x70 [ 83.818233][ T1826] alloc_vmap_area+0x1734/0x1870 [ 83.823161][ T1826] ? vm_map_ram+0x9c0/0x9c0 [ 83.827655][ T1826] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 83.833187][ T1826] ? __get_vm_area_node+0x113/0x450 [ 83.838373][ T1826] __get_vm_area_node+0x147/0x450 [ 83.843390][ T1826] __vmalloc_node_range+0xe0/0x780 [ 83.848493][ T1826] ? dev_map_create_hash+0x26/0x1c0 [ 83.853701][ T1826] bpf_map_area_alloc+0xd5/0xe0 [ 83.858551][ T1826] ? dev_map_create_hash+0x26/0x1c0 [ 83.863739][ T1826] dev_map_create_hash+0x26/0x1c0 [ 83.868757][ T1826] dev_map_alloc+0x340/0x6b0 [ 83.873339][ T1826] map_create+0x441/0x2190 [ 83.877763][ T1826] __se_sys_bpf+0x203/0x680 [ 83.882257][ T1826] ? __x64_sys_bpf+0x90/0x90 [ 83.886837][ T1826] __x64_sys_bpf+0x7b/0x90 [ 83.891239][ T1826] do_syscall_64+0x31/0x40 [ 83.895730][ T1826] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 83.901615][ T1826] RIP: 0033:0x7fb6adc65929 [ 83.906020][ T1826] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 83.925609][ T1826] RSP: 002b:00007fb6ac2ce038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 83.934013][ T1826] RAX: ffffffffffffffda RBX: 00007fb6ade8cfa0 RCX: 00007fb6adc65929 [ 83.941974][ T1826] RDX: 0000000000000050 RSI: 00002000000006c0 RDI: 0000000000000000 [ 83.949932][ T1826] RBP: 00007fb6ac2ce090 R08: 0000000000000000 R09: 0000000000000000 [ 83.957897][ T1826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 83.965854][ T1826] R13: 0000000000000000 R14: 00007fb6ade8cfa0 R15: 00007ffdc1b7b888 [ 84.787447][ T1845] syz.0.593[1845] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.787509][ T1845] syz.0.593[1845] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 84.948583][ T24] audit: type=1400 audit(1750134029.760:125): avc: denied { create } for pid=1840 comm="syz.1.592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 85.954990][ T1872] €Â0: renamed from pim6reg1 [ 86.247896][ T1879] syz.3.606[1879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.247942][ T1879] syz.3.606[1879] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 86.702470][ T1888] device syzkaller0 entered promiscuous mode [ 87.966801][ T1918] syz.2.620[1918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 87.966854][ T1918] syz.2.620[1918] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 88.350366][ T1931] device syzkaller0 entered promiscuous mode [ 88.496721][ T1935] €Â0: renamed from pim6reg1 [ 89.741106][ T1962] syz.2.636[1962] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 89.741159][ T1962] syz.2.636[1962] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 90.038851][ T1968] €Â0: renamed from pim6reg1 [ 90.121156][ T24] audit: type=1400 audit(1750134034.940:126): avc: denied { create } for pid=1964 comm="syz.0.635" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 91.741994][ T24] audit: type=1400 audit(1750134036.560:127): avc: denied { cpu } for pid=2010 comm="syz.4.654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 91.873943][ T2001] device syzkaller0 entered promiscuous mode [ 91.890342][ T24] audit: type=1400 audit(1750134036.700:128): avc: denied { create } for pid=2010 comm="syz.4.654" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 92.365406][ T2027] €Â0: renamed from pim6reg1 [ 93.117576][ T2045] syz.0.665[2045] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.117624][ T2045] syz.0.665[2045] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 93.388258][ T2059] €Â0: renamed from pim6reg1 [ 94.145579][ T2070] €Â0: renamed from pim6reg1 [ 95.191206][ T2095] device syzkaller0 entered promiscuous mode [ 95.477324][ T2100] syz.3.681[2100] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 95.477382][ T2100] syz.3.681[2100] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 97.443405][ T2124] €Â0: renamed from pim6reg1 [ 98.428987][ T2148] FAULT_INJECTION: forcing a failure. [ 98.428987][ T2148] name failslab, interval 1, probability 0, space 0, times 0 [ 98.580953][ T2148] CPU: 0 PID: 2148 Comm: syz.0.700 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 98.592207][ T2148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 98.602311][ T2148] Call Trace: [ 98.605616][ T2148] __dump_stack+0x21/0x24 [ 98.609950][ T2148] dump_stack_lvl+0x169/0x1d8 [ 98.614633][ T2148] ? show_regs_print_info+0x18/0x18 [ 98.619840][ T2148] ? kasan_check_range+0x1b4/0x290 [ 98.624969][ T2148] dump_stack+0x15/0x1c [ 98.629302][ T2148] should_fail+0x3c1/0x510 [ 98.633736][ T2148] ? copy_fs_struct+0x4c/0x220 [ 98.638509][ T2148] __should_failslab+0xa4/0xe0 [ 98.643288][ T2148] should_failslab+0x9/0x20 [ 98.647945][ T2148] kmem_cache_alloc+0x3d/0x2e0 [ 98.652716][ T2148] ? copy_files+0xd6/0x160 [ 98.657137][ T2148] copy_fs_struct+0x4c/0x220 [ 98.661724][ T2148] copy_fs+0x6f/0x140 [ 98.665701][ T2148] copy_process+0x1103/0x32c0 [ 98.670380][ T2148] ? __pidfd_prepare+0x150/0x150 [ 98.675319][ T2148] ? vfs_write+0xac8/0xd60 [ 98.679750][ T2148] kernel_clone+0x23f/0x940 [ 98.684191][ T2154] device syzkaller0 entered promiscuous mode [ 98.684264][ T2148] ? kernel_write+0x3c0/0x3c0 [ 98.694912][ T2148] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 98.700724][ T2148] ? create_io_thread+0x130/0x130 [ 98.705747][ T2148] ? mutex_lock+0x8c/0xe0 [ 98.710079][ T2148] __x64_sys_clone+0x176/0x1d0 [ 98.714852][ T2148] ? __ia32_sys_vfork+0xf0/0xf0 [ 98.719716][ T2148] ? ksys_write+0x1eb/0x240 [ 98.724233][ T2148] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 98.730303][ T2148] do_syscall_64+0x31/0x40 [ 98.734728][ T2148] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 98.740622][ T2148] RIP: 0033:0x7fdff3f3c929 [ 98.745044][ T2148] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 98.764653][ T2148] RSP: 002b:00007fdff25a4fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 98.773109][ T2148] RAX: ffffffffffffffda RBX: 00007fdff4163fa0 RCX: 00007fdff3f3c929 [ 98.781077][ T2148] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 98.789044][ T2148] RBP: 00007fdff25a5090 R08: 0000000000000000 R09: 0000000000000000 [ 98.797011][ T2148] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 98.804990][ T2148] R13: 0000000000000000 R14: 00007fdff4163fa0 R15: 00007ffc41031a78 [ 99.198230][ T2172] FAULT_INJECTION: forcing a failure. [ 99.198230][ T2172] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 99.296349][ T2172] CPU: 0 PID: 2172 Comm: syz.3.709 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 99.307573][ T2172] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 99.317627][ T2172] Call Trace: [ 99.320920][ T2172] __dump_stack+0x21/0x24 [ 99.325262][ T2172] dump_stack_lvl+0x169/0x1d8 [ 99.329962][ T2172] ? show_regs_print_info+0x18/0x18 [ 99.335162][ T2172] dump_stack+0x15/0x1c [ 99.339328][ T2172] should_fail+0x3c1/0x510 [ 99.343735][ T2172] should_fail_alloc_page+0x4f/0x60 [ 99.348928][ T2172] __alloc_pages_nodemask+0x109/0x5f0 [ 99.354296][ T2172] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 99.359829][ T2172] ? __kmalloc_track_caller+0x181/0x320 [ 99.365364][ T2172] ? kmem_cache_alloc+0xd0/0x2e0 [ 99.370288][ T2172] ? kasan_unpoison+0x67/0x90 [ 99.374954][ T2172] ? __kasan_check_write+0x14/0x20 [ 99.380063][ T2172] ? __alloc_skb+0x38b/0x520 [ 99.384639][ T2172] alloc_skb_with_frags+0x1bc/0x560 [ 99.389823][ T2172] sock_alloc_send_pskb+0x853/0x980 [ 99.395019][ T2172] ? is_bpf_text_address+0x177/0x190 [ 99.400298][ T2172] ? sock_kzfree_s+0x60/0x60 [ 99.404893][ T2172] ? iov_iter_advance+0x1f7/0x750 [ 99.409913][ T2172] tun_get_user+0x4bd/0x3090 [ 99.414518][ T2172] ? ____kasan_slab_free+0x125/0x160 [ 99.419792][ T2172] ? __kasan_slab_free+0x11/0x20 [ 99.424728][ T2172] ? putname+0xfe/0x150 [ 99.428875][ T2172] ? __x64_sys_openat+0x136/0x160 [ 99.433892][ T2172] ? do_syscall_64+0x31/0x40 [ 99.438474][ T2172] ? tun_do_read+0x1c00/0x1c00 [ 99.443228][ T2172] ? kstrtouint_from_user+0x1a0/0x200 [ 99.448595][ T2172] ? __fsnotify_parent+0x5f5/0x6c0 [ 99.453696][ T2172] ? avc_policy_seqno+0x1b/0x70 [ 99.458539][ T2172] ? selinux_file_permission+0x2a5/0x510 [ 99.464181][ T2172] ? fsnotify_perm+0x66/0x4b0 [ 99.468864][ T2172] tun_chr_write_iter+0x1bf/0x270 [ 99.473884][ T2172] vfs_write+0x725/0xd60 [ 99.478134][ T2172] ? kernel_write+0x3c0/0x3c0 [ 99.482806][ T2172] ? __fget_files+0x2c4/0x320 [ 99.487471][ T2172] ? __fdget_pos+0x1f7/0x380 [ 99.492045][ T2172] ? ksys_write+0x71/0x240 [ 99.496444][ T2172] ksys_write+0x140/0x240 [ 99.500758][ T2172] ? __ia32_sys_read+0x90/0x90 [ 99.505510][ T2172] ? fpu__clear_all+0x20/0x20 [ 99.510174][ T2172] __x64_sys_write+0x7b/0x90 [ 99.514780][ T2172] do_syscall_64+0x31/0x40 [ 99.519189][ T2172] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 99.525078][ T2172] RIP: 0033:0x7f3efd81c929 [ 99.529484][ T2172] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 99.549085][ T2172] RSP: 002b:00007f3efbe85038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 99.557491][ T2172] RAX: ffffffffffffffda RBX: 00007f3efda43fa0 RCX: 00007f3efd81c929 [ 99.565452][ T2172] RDX: 000000000000ffdd RSI: 0000200000000140 RDI: 0000000000000003 [ 99.573406][ T2172] RBP: 00007f3efbe85090 R08: 0000000000000000 R09: 0000000000000000 [ 99.581361][ T2172] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 99.589319][ T2172] R13: 0000000000000000 R14: 00007f3efda43fa0 R15: 00007ffeef890028 [ 99.609057][ T2180] device pim6reg1 entered promiscuous mode [ 99.898314][ T2186] device syzkaller0 entered promiscuous mode [ 100.149750][ T2201] €Â0: renamed from pim6reg1 [ 100.252584][ T2205] €Â0: renamed from pim6reg1 [ 101.838196][ T2247] device syzkaller0 entered promiscuous mode [ 101.980972][ T2251] €Â0: renamed from pim6reg1 [ 102.844128][ T24] audit: type=1400 audit(1750134047.660:129): avc: denied { create } for pid=2277 comm="syz.1.747" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 102.861265][ T2260] device syzkaller0 entered promiscuous mode [ 103.252872][ T2288] device syzkaller0 entered promiscuous mode [ 104.254540][ T2323] €Â0: renamed from pim6reg1 [ 104.337741][ T2331] syz.0.765[2331] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.337825][ T2331] syz.0.765[2331] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 104.694867][ T2336] device syzkaller0 entered promiscuous mode [ 104.805812][ T2340] device syzkaller0 entered promiscuous mode [ 106.654691][ T2383] €Â0: renamed from pim6reg1 [ 107.012421][ T2394] syz.1.788[2394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.012538][ T2394] syz.1.788[2394] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 107.318581][ T2398] device syzkaller0 entered promiscuous mode [ 107.813504][ T24] audit: type=1400 audit(1750134052.630:130): avc: denied { create } for pid=2412 comm="syz.4.797" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 108.031780][ T24] audit: type=1400 audit(1750134052.850:131): avc: denied { create } for pid=2419 comm="syz.4.800" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 108.420059][ T2439] syz.4.806[2439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 108.420129][ T2439] syz.4.806[2439] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.578480][ T2464] syz.1.817[2464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.661528][ T24] audit: type=1400 audit(1750134054.480:132): avc: denied { create } for pid=2465 comm="syz.3.818" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 109.693130][ T2470] €Â0: renamed from pim6reg1 [ 109.716983][ T2464] syz.1.817[2464] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 109.791020][ T2475] FAULT_INJECTION: forcing a failure. [ 109.791020][ T2475] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 109.815401][ T2475] CPU: 0 PID: 2475 Comm: syz.3.819 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 109.826609][ T2475] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 109.836678][ T2475] Call Trace: [ 109.839988][ T2475] __dump_stack+0x21/0x24 [ 109.844342][ T2475] dump_stack_lvl+0x169/0x1d8 [ 109.849041][ T2475] ? thaw_kernel_threads+0x220/0x220 [ 109.854343][ T2475] ? show_regs_print_info+0x18/0x18 [ 109.859561][ T2475] dump_stack+0x15/0x1c [ 109.863743][ T2475] should_fail+0x3c1/0x510 [ 109.868224][ T2475] should_fail_usercopy+0x1a/0x20 [ 109.873245][ T2475] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 109.879305][ T2475] generic_perform_write+0x326/0x510 [ 109.884603][ T2475] ? grab_cache_page_write_begin+0xb0/0xb0 [ 109.890412][ T2475] ? file_remove_privs+0x580/0x580 [ 109.895516][ T2475] ? __fsnotify_parent+0x5f5/0x6c0 [ 109.900618][ T2475] ? __kasan_check_write+0x14/0x20 [ 109.905723][ T2475] ? down_write+0xac/0x110 [ 109.910138][ T2475] __generic_file_write_iter+0x24b/0x480 [ 109.915763][ T2475] ? generic_write_checks+0x3d4/0x480 [ 109.921129][ T2475] generic_file_write_iter+0xa9/0x1d0 [ 109.926489][ T2475] vfs_write+0x725/0xd60 [ 109.930725][ T2475] ? __kasan_slab_free+0x11/0x20 [ 109.935653][ T2475] ? kernel_write+0x3c0/0x3c0 [ 109.940321][ T2475] ? mutex_trylock+0xa0/0xa0 [ 109.944900][ T2475] ? __fget_files+0x2c4/0x320 [ 109.949573][ T2475] ? __fdget_pos+0x2d2/0x380 [ 109.954162][ T2475] ? ksys_write+0x71/0x240 [ 109.958575][ T2475] ksys_write+0x140/0x240 [ 109.962896][ T2475] ? __ia32_sys_read+0x90/0x90 [ 109.967654][ T2475] ? fpu__clear_all+0x20/0x20 [ 109.972324][ T2475] __x64_sys_write+0x7b/0x90 [ 109.977037][ T2475] do_syscall_64+0x31/0x40 [ 109.981472][ T2475] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 109.987355][ T2475] RIP: 0033:0x7f3efd81c929 [ 109.991768][ T2475] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 110.011361][ T2475] RSP: 002b:00007f3efbe85038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 110.019765][ T2475] RAX: ffffffffffffffda RBX: 00007f3efda43fa0 RCX: 00007f3efd81c929 [ 110.027733][ T2475] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000006 [ 110.035697][ T2475] RBP: 00007f3efbe85090 R08: 0000000000000000 R09: 0000000000000000 [ 110.043659][ T2475] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 110.051626][ T2475] R13: 0000000000000000 R14: 00007f3efda43fa0 R15: 00007ffeef890028 [ 110.102712][ T2469] device syzkaller0 entered promiscuous mode [ 110.557238][ T2485] device syzkaller0 entered promiscuous mode [ 110.694669][ T2495] €Â0: renamed from pim6reg1 [ 111.140000][ T2513] device syzkaller0 entered promiscuous mode [ 111.358961][ T2517] device syzkaller0 entered promiscuous mode [ 111.567597][ T2533] device wg2 entered promiscuous mode [ 111.622834][ T2531] €Â0: renamed from pim6reg1 [ 111.762061][ T2533] device syzkaller0 entered promiscuous mode [ 112.052712][ T24] audit: type=1400 audit(1750134056.870:133): avc: denied { create } for pid=2554 comm="syz.1.850" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 112.151698][ T2562] device syzkaller0 entered promiscuous mode [ 113.002483][ T2583] FAULT_INJECTION: forcing a failure. [ 113.002483][ T2583] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 113.024385][ T2583] CPU: 1 PID: 2583 Comm: syz.4.861 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 113.035642][ T2583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 113.045694][ T2583] Call Trace: [ 113.048986][ T2583] __dump_stack+0x21/0x24 [ 113.053311][ T2583] dump_stack_lvl+0x169/0x1d8 [ 113.057989][ T2583] ? show_regs_print_info+0x18/0x18 [ 113.063183][ T2583] ? kvm_sched_clock_read+0x18/0x40 [ 113.068385][ T2583] dump_stack+0x15/0x1c [ 113.072537][ T2583] should_fail+0x3c1/0x510 [ 113.076953][ T2583] should_fail_usercopy+0x1a/0x20 [ 113.081970][ T2583] _copy_from_user+0x20/0xd0 [ 113.086550][ T2583] tipc_setsockopt+0x34c/0x900 [ 113.091304][ T2583] ? tipc_shutdown+0x960/0x960 [ 113.096057][ T2583] ? tipc_shutdown+0x960/0x960 [ 113.100813][ T2583] __sys_setsockopt+0x2ed/0x460 [ 113.105657][ T2583] ? __ia32_sys_recv+0xb0/0xb0 [ 113.110409][ T2583] ? sched_clock+0x3a/0x40 [ 113.114816][ T2583] ? sched_clock_cpu+0x1b/0x3d0 [ 113.119657][ T2583] ? debug_smp_processor_id+0x17/0x20 [ 113.125023][ T2583] __x64_sys_setsockopt+0xbf/0xd0 [ 113.130047][ T2583] do_syscall_64+0x31/0x40 [ 113.134455][ T2583] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 113.140339][ T2583] RIP: 0033:0x7fbca2c9d929 [ 113.144746][ T2583] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 113.164346][ T2583] RSP: 002b:00007fbca1306038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 113.172795][ T2583] RAX: ffffffffffffffda RBX: 00007fbca2ec4fa0 RCX: 00007fbca2c9d929 [ 113.180760][ T2583] RDX: 0000000000000087 RSI: 000000000000010f RDI: 000000000000000c [ 113.188726][ T2583] RBP: 00007fbca1306090 R08: 00000000000004bd R09: 0000000000000000 [ 113.196689][ T2583] R10: 0000200000000180 R11: 0000000000000246 R12: 0000000000000001 [ 113.204663][ T2583] R13: 0000000000000000 R14: 00007fbca2ec4fa0 R15: 00007ffe080e8aa8 [ 113.588340][ T24] audit: type=1400 audit(1750134058.410:134): avc: denied { create } for pid=2606 comm="syz.0.871" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 113.880722][ T2625] FAULT_INJECTION: forcing a failure. [ 113.880722][ T2625] name failslab, interval 1, probability 0, space 0, times 0 [ 113.966933][ T2625] CPU: 0 PID: 2625 Comm: syz.0.876 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 113.978189][ T2625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 113.988264][ T2625] Call Trace: [ 113.991569][ T2625] __dump_stack+0x21/0x24 [ 113.995920][ T2625] dump_stack_lvl+0x169/0x1d8 [ 114.000613][ T2625] ? thaw_kernel_threads+0x220/0x220 [ 114.006005][ T2625] ? show_regs_print_info+0x18/0x18 [ 114.011313][ T2625] dump_stack+0x15/0x1c [ 114.015483][ T2625] should_fail+0x3c1/0x510 [ 114.019915][ T2625] ? __alloc_skb+0x9e/0x520 [ 114.024424][ T2625] __should_failslab+0xa4/0xe0 [ 114.029208][ T2625] should_failslab+0x9/0x20 [ 114.033729][ T2625] kmem_cache_alloc+0x3d/0x2e0 [ 114.038521][ T2625] __alloc_skb+0x9e/0x520 [ 114.042868][ T2625] alloc_skb_with_frags+0xa2/0x560 [ 114.047996][ T2625] sock_alloc_send_pskb+0x853/0x980 [ 114.053204][ T2625] ? is_bpf_text_address+0x177/0x190 [ 114.058505][ T2625] ? __kernel_text_address+0xa0/0x100 [ 114.063894][ T2625] ? sock_kzfree_s+0x60/0x60 [ 114.068502][ T2625] ? stack_trace_save+0x98/0xe0 [ 114.073363][ T2625] tun_get_user+0x4bd/0x3090 [ 114.077966][ T2625] ? __x64_sys_openat+0x136/0x160 [ 114.082991][ T2625] ? tun_do_read+0x1c00/0x1c00 [ 114.087861][ T2625] ? kstrtouint_from_user+0x1a0/0x200 [ 114.093251][ T2625] ? __fsnotify_parent+0x5f5/0x6c0 [ 114.098367][ T2625] ? avc_policy_seqno+0x1b/0x70 [ 114.103216][ T2625] ? selinux_file_permission+0x2a5/0x510 [ 114.108848][ T2625] ? fsnotify_perm+0x66/0x4b0 [ 114.113524][ T2625] tun_chr_write_iter+0x1bf/0x270 [ 114.118549][ T2625] vfs_write+0x725/0xd60 [ 114.122790][ T2625] ? kernel_write+0x3c0/0x3c0 [ 114.127456][ T2625] ? __fget_files+0x2c4/0x320 [ 114.132238][ T2625] ? __fdget_pos+0x1f7/0x380 [ 114.136821][ T2625] ? ksys_write+0x71/0x240 [ 114.141229][ T2625] ksys_write+0x140/0x240 [ 114.145644][ T2625] ? __ia32_sys_read+0x90/0x90 [ 114.150400][ T2625] ? fpu__clear_all+0x20/0x20 [ 114.155067][ T2625] __x64_sys_write+0x7b/0x90 [ 114.159651][ T2625] do_syscall_64+0x31/0x40 [ 114.164059][ T2625] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 114.169940][ T2625] RIP: 0033:0x7fdff3f3c929 [ 114.174349][ T2625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 114.193949][ T2625] RSP: 002b:00007fdff25a5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 114.202350][ T2625] RAX: ffffffffffffffda RBX: 00007fdff4163fa0 RCX: 00007fdff3f3c929 [ 114.210312][ T2625] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 00000000000000c8 [ 114.218280][ T2625] RBP: 00007fdff25a5090 R08: 0000000000000000 R09: 0000000000000000 [ 114.226244][ T2625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 114.234208][ T2625] R13: 0000000000000000 R14: 00007fdff4163fa0 R15: 00007ffc41031a78 [ 114.604886][ T2640] device syzkaller0 entered promiscuous mode [ 114.832520][ T2639] device syzkaller0 entered promiscuous mode [ 115.147458][ T2659] FAULT_INJECTION: forcing a failure. [ 115.147458][ T2659] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 115.216738][ T2659] CPU: 1 PID: 2659 Comm: syz.3.888 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 115.227984][ T2659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 115.238050][ T2659] Call Trace: [ 115.241359][ T2659] __dump_stack+0x21/0x24 [ 115.245718][ T2659] dump_stack_lvl+0x169/0x1d8 [ 115.250406][ T2659] ? show_regs_print_info+0x18/0x18 [ 115.255612][ T2659] ? vfs_write+0xac8/0xd60 [ 115.260043][ T2659] dump_stack+0x15/0x1c [ 115.264214][ T2659] should_fail+0x3c1/0x510 [ 115.268650][ T2659] should_fail_usercopy+0x1a/0x20 [ 115.273693][ T2659] _copy_from_user+0x20/0xd0 [ 115.278289][ T2659] __se_sys_bpf+0x181/0x680 [ 115.282800][ T2659] ? __x64_sys_bpf+0x90/0x90 [ 115.287407][ T2659] ? fpu__clear_all+0x20/0x20 [ 115.292094][ T2659] __x64_sys_bpf+0x7b/0x90 [ 115.296520][ T2659] do_syscall_64+0x31/0x40 [ 115.301025][ T2659] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 115.306934][ T2659] RIP: 0033:0x7f3efd81c929 [ 115.311374][ T2659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 115.330988][ T2659] RSP: 002b:00007f3efbe85038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 115.339415][ T2659] RAX: ffffffffffffffda RBX: 00007f3efda43fa0 RCX: 00007f3efd81c929 [ 115.347393][ T2659] RDX: 0000000000000018 RSI: 00002000000014c0 RDI: 0000000000000007 [ 115.355370][ T2659] RBP: 00007f3efbe85090 R08: 0000000000000000 R09: 0000000000000000 [ 115.363348][ T2659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.371330][ T2659] R13: 0000000000000000 R14: 00007f3efda43fa0 R15: 00007ffeef890028 [ 115.581102][ T2673] €Â0: renamed from pim6reg1 [ 116.689762][ T2709] syz.1.903[2709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.689814][ T2709] syz.1.903[2709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 116.716358][ T2709] FAULT_INJECTION: forcing a failure. [ 116.716358][ T2709] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 116.897150][ T2709] CPU: 0 PID: 2709 Comm: syz.1.903 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 116.908405][ T2709] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 116.918478][ T2709] Call Trace: [ 116.921832][ T2709] __dump_stack+0x21/0x24 [ 116.926170][ T2709] dump_stack_lvl+0x169/0x1d8 [ 116.930861][ T2709] ? thaw_kernel_threads+0x220/0x220 [ 116.936150][ T2709] ? vsnprintf+0x1871/0x1960 [ 116.940742][ T2709] ? show_regs_print_info+0x18/0x18 [ 116.945958][ T2709] dump_stack+0x15/0x1c [ 116.950113][ T2709] should_fail+0x3c1/0x510 [ 116.954525][ T2709] should_fail_usercopy+0x1a/0x20 [ 116.959543][ T2709] _copy_to_user+0x20/0x90 [ 116.963954][ T2709] simple_read_from_buffer+0xe9/0x160 [ 116.969318][ T2709] proc_fail_nth_read+0x19a/0x210 [ 116.974344][ T2709] ? proc_fault_inject_write+0x2f0/0x2f0 [ 116.979972][ T2709] ? rw_verify_area+0x1c0/0x360 [ 116.984813][ T2709] ? proc_fault_inject_write+0x2f0/0x2f0 [ 116.990437][ T2709] vfs_read+0x1fe/0xa10 [ 116.994585][ T2709] ? kernel_read+0x70/0x70 [ 116.998995][ T2709] ? __kasan_check_write+0x14/0x20 [ 117.004097][ T2709] ? mutex_lock+0x8c/0xe0 [ 117.008415][ T2709] ? mutex_trylock+0xa0/0xa0 [ 117.012998][ T2709] ? __fget_files+0x2c4/0x320 [ 117.017670][ T2709] ? __fdget_pos+0x2d2/0x380 [ 117.022257][ T2709] ? ksys_read+0x71/0x240 [ 117.026577][ T2709] ksys_read+0x140/0x240 [ 117.030810][ T2709] ? vfs_write+0xd60/0xd60 [ 117.035221][ T2709] ? __bpf_trace_sys_enter+0x62/0x70 [ 117.040499][ T2709] __x64_sys_read+0x7b/0x90 [ 117.044996][ T2709] do_syscall_64+0x31/0x40 [ 117.049407][ T2709] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 117.055292][ T2709] RIP: 0033:0x7fb6adc6433c [ 117.059701][ T2709] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 117.079300][ T2709] RSP: 002b:00007fb6ac2ce030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 117.087710][ T2709] RAX: ffffffffffffffda RBX: 00007fb6ade8cfa0 RCX: 00007fb6adc6433c [ 117.095673][ T2709] RDX: 000000000000000f RSI: 00007fb6ac2ce0a0 RDI: 0000000000000006 [ 117.103639][ T2709] RBP: 00007fb6ac2ce090 R08: 0000000000000000 R09: 0000000000000000 [ 117.111607][ T2709] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 117.119599][ T2709] R13: 0000000000000000 R14: 00007fb6ade8cfa0 R15: 00007ffdc1b7b888 [ 118.245731][ T2750] FAULT_INJECTION: forcing a failure. [ 118.245731][ T2750] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 118.366143][ T2750] CPU: 0 PID: 2750 Comm: syz.1.917 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 118.377391][ T2750] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 118.387473][ T2750] Call Trace: [ 118.390784][ T2750] __dump_stack+0x21/0x24 [ 118.395210][ T2750] dump_stack_lvl+0x169/0x1d8 [ 118.399895][ T2750] ? show_regs_print_info+0x18/0x18 [ 118.405114][ T2750] ? vfs_write+0xac8/0xd60 [ 118.409542][ T2750] dump_stack+0x15/0x1c [ 118.413695][ T2750] should_fail+0x3c1/0x510 [ 118.418136][ T2750] should_fail_usercopy+0x1a/0x20 [ 118.423160][ T2750] _copy_from_user+0x20/0xd0 [ 118.427749][ T2750] __se_sys_bpf+0x181/0x680 [ 118.432250][ T2750] ? __x64_sys_bpf+0x90/0x90 [ 118.436846][ T2750] ? fpu__clear_all+0x20/0x20 [ 118.441530][ T2750] __x64_sys_bpf+0x7b/0x90 [ 118.445949][ T2750] do_syscall_64+0x31/0x40 [ 118.450370][ T2750] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 118.456280][ T2750] RIP: 0033:0x7fb6adc65929 [ 118.460706][ T2750] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 118.480337][ T2750] RSP: 002b:00007fb6ac2ce038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 118.488768][ T2750] RAX: ffffffffffffffda RBX: 00007fb6ade8cfa0 RCX: 00007fb6adc65929 [ 118.496754][ T2750] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 118.504727][ T2750] RBP: 00007fb6ac2ce090 R08: 0000000000000000 R09: 0000000000000000 [ 118.512806][ T2750] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 118.520796][ T2750] R13: 0000000000000000 R14: 00007fb6ade8cfa0 R15: 00007ffdc1b7b888 [ 120.298661][ T2780] device syzkaller0 entered promiscuous mode [ 121.068468][ T24] audit: type=1400 audit(1750134065.890:135): avc: denied { create } for pid=2806 comm="syz.3.935" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 121.253311][ T2823] syz.1.940[2823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.253370][ T2823] syz.1.940[2823] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 121.293513][ T2819] device syzkaller0 entered promiscuous mode [ 121.832163][ T2827] device syzkaller0 entered promiscuous mode [ 122.990411][ T2874] FAULT_INJECTION: forcing a failure. [ 122.990411][ T2874] name failslab, interval 1, probability 0, space 0, times 0 [ 123.003078][ T2874] CPU: 0 PID: 2874 Comm: syz.0.959 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 123.014277][ T2874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 123.024355][ T2874] Call Trace: [ 123.027660][ T2874] __dump_stack+0x21/0x24 [ 123.032002][ T2874] dump_stack_lvl+0x169/0x1d8 [ 123.036691][ T2874] ? show_regs_print_info+0x18/0x18 [ 123.041909][ T2874] dump_stack+0x15/0x1c [ 123.046079][ T2874] should_fail+0x3c1/0x510 [ 123.050508][ T2874] ? __alloc_skb+0x9e/0x520 [ 123.055047][ T2874] __should_failslab+0xa4/0xe0 [ 123.059825][ T2874] should_failslab+0x9/0x20 [ 123.064344][ T2874] kmem_cache_alloc+0x3d/0x2e0 [ 123.069127][ T2874] ? unwind_get_return_address+0x4d/0x90 [ 123.074770][ T2874] __alloc_skb+0x9e/0x520 [ 123.079120][ T2874] ? __kasan_check_write+0x14/0x20 [ 123.084248][ T2874] __napi_alloc_skb+0x158/0x2e0 [ 123.089118][ T2874] napi_get_frags+0x6b/0x170 [ 123.093718][ T2874] tun_get_user+0xa2c/0x3090 [ 123.098435][ T2874] ? _raw_spin_lock_irqsave+0xb0/0x110 [ 123.103908][ T2874] ? _raw_spin_lock+0xe0/0xe0 [ 123.108602][ T2874] ? tun_do_read+0x1c00/0x1c00 [ 123.113379][ T2874] ? kstrtouint_from_user+0x1a0/0x200 [ 123.118768][ T2874] ? __fsnotify_parent+0x5f5/0x6c0 [ 123.123891][ T2874] ? avc_policy_seqno+0x1b/0x70 [ 123.128765][ T2874] ? selinux_file_permission+0x2a5/0x510 [ 123.134413][ T2874] ? fsnotify_perm+0x66/0x4b0 [ 123.139108][ T2874] tun_chr_write_iter+0x1bf/0x270 [ 123.144161][ T2874] vfs_write+0x725/0xd60 [ 123.148417][ T2874] ? __bpf_trace_kmem_free+0x6f/0x90 [ 123.153722][ T2874] ? kernel_write+0x3c0/0x3c0 [ 123.158410][ T2874] ? __fget_files+0x2c4/0x320 [ 123.163106][ T2874] ? __fdget_pos+0x1f7/0x380 [ 123.167722][ T2874] ? ksys_write+0x71/0x240 [ 123.172157][ T2874] ksys_write+0x140/0x240 [ 123.176500][ T2874] ? __ia32_sys_read+0x90/0x90 [ 123.181270][ T2874] ? fpu__clear_all+0x20/0x20 [ 123.185955][ T2874] __x64_sys_write+0x7b/0x90 [ 123.190557][ T2874] do_syscall_64+0x31/0x40 [ 123.194985][ T2874] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 123.200884][ T2874] RIP: 0033:0x7fdff3f3c929 [ 123.205307][ T2874] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 123.224919][ T2874] RSP: 002b:00007fdff25a5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 123.233357][ T2874] RAX: ffffffffffffffda RBX: 00007fdff4163fa0 RCX: 00007fdff3f3c929 [ 123.241344][ T2874] RDX: 000000000000fdef RSI: 0000200000000440 RDI: 0000000000000003 [ 123.249342][ T2874] RBP: 00007fdff25a5090 R08: 0000000000000000 R09: 0000000000000000 [ 123.257323][ T2874] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 123.265305][ T2874] R13: 0000000000000000 R14: 00007fdff4163fa0 R15: 00007ffc41031a78 [ 124.177717][ T2913] device syzkaller0 entered promiscuous mode [ 125.642465][ T2955] device veth0_vlan left promiscuous mode [ 125.653257][ T2955] device veth0_vlan entered promiscuous mode [ 126.832782][ T2997] device pim6reg1 entered promiscuous mode [ 127.953763][ T3012] device syzkaller0 entered promiscuous mode [ 128.347831][ T3025] syz.1.1012[3025] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.347884][ T3025] syz.1.1012[3025] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 129.358275][ T3043] device wg2 left promiscuous mode [ 129.540397][ T3043] device syzkaller0 entered promiscuous mode [ 129.799072][ T3043] device wg2 entered promiscuous mode [ 130.096964][ T3066] syz.2.1023[3066] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.097017][ T3066] syz.2.1023[3066] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 130.321683][ T3067] device syzkaller0 entered promiscuous mode [ 130.947791][ T3087] device syzkaller0 entered promiscuous mode [ 131.266882][ T3102] device pim6reg1 entered promiscuous mode [ 131.350609][ T3109] syz.4.1037[3109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.350660][ T3109] syz.4.1037[3109] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.774383][ T3126] syz.2.1044[3126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.794724][ T3115] device syzkaller0 entered promiscuous mode [ 131.816754][ T3126] syz.2.1044[3126] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 131.962439][ T3131] FAULT_INJECTION: forcing a failure. [ 131.962439][ T3131] name failslab, interval 1, probability 0, space 0, times 0 [ 132.036897][ T3131] CPU: 0 PID: 3131 Comm: syz.2.1046 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 132.048312][ T3131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 132.058382][ T3131] Call Trace: [ 132.061693][ T3131] __dump_stack+0x21/0x24 [ 132.066037][ T3131] dump_stack_lvl+0x169/0x1d8 [ 132.070727][ T3131] ? thaw_kernel_threads+0x220/0x220 [ 132.076023][ T3131] ? sched_clock_cpu+0x1b/0x3d0 [ 132.080889][ T3131] ? show_regs_print_info+0x18/0x18 [ 132.086102][ T3131] dump_stack+0x15/0x1c [ 132.090265][ T3131] should_fail+0x3c1/0x510 [ 132.094687][ T3131] ? __get_vm_area_node+0x113/0x450 [ 132.099993][ T3131] __should_failslab+0xa4/0xe0 [ 132.104760][ T3131] should_failslab+0x9/0x20 [ 132.109259][ T3131] kmem_cache_alloc_trace+0x3a/0x2e0 [ 132.114549][ T3131] __get_vm_area_node+0x113/0x450 [ 132.119572][ T3131] __vmalloc_node_range+0xe0/0x780 [ 132.124683][ T3131] ? bpf_check+0x1b7/0xd720 [ 132.129187][ T3131] ? kmalloc_order_trace+0x16/0x80 [ 132.134301][ T3131] ? bpf_check+0x1b7/0xd720 [ 132.138804][ T3131] vzalloc+0x78/0x90 [ 132.142699][ T3131] ? bpf_check+0x1b7/0xd720 [ 132.147196][ T3131] bpf_check+0x1b7/0xd720 [ 132.151523][ T3131] ? __kasan_check_read+0x11/0x20 [ 132.156539][ T3131] ? preempt_schedule_irq+0xbb/0x110 [ 132.161816][ T3131] ? preempt_schedule_notrace+0x110/0x110 [ 132.167548][ T3131] ? bpf_get_btf_vmlinux+0x60/0x60 [ 132.172649][ T3131] ? 0xffffffffa0028000 [ 132.176794][ T3131] ? is_bpf_text_address+0x177/0x190 [ 132.182076][ T3131] ? selinux_bpf_prog_alloc+0x51/0x140 [ 132.187525][ T3131] ? __kernel_text_address+0xa0/0x100 [ 132.192891][ T3131] ? unwind_get_return_address+0x4d/0x90 [ 132.198653][ T3131] ? stack_trace_save+0xe0/0xe0 [ 132.203503][ T3131] ? arch_stack_walk+0xee/0x140 [ 132.208357][ T3131] ? stack_trace_save+0x98/0xe0 [ 132.213213][ T3131] ? stack_trace_snprint+0xf0/0xf0 [ 132.218323][ T3131] ? __kasan_slab_alloc+0x69/0xf0 [ 132.223349][ T3131] ? kvm_sched_clock_read+0x18/0x40 [ 132.228550][ T3131] ? sched_clock_cpu+0x1b/0x3d0 [ 132.233396][ T3131] ? kvm_sched_clock_read+0x18/0x40 [ 132.238587][ T3131] ? sched_clock+0x3a/0x40 [ 132.242997][ T3131] ? sched_clock_cpu+0x1b/0x3d0 [ 132.247837][ T3131] ? sched_clock+0x3a/0x40 [ 132.252246][ T3131] ? sched_clock_cpu+0x1b/0x3d0 [ 132.257094][ T3131] ? __irq_exit_rcu+0x40/0x150 [ 132.261848][ T3131] ? irq_exit_rcu+0x9/0x10 [ 132.266258][ T3131] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 132.272065][ T3131] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 132.278212][ T3131] ? bpf_prog_load+0xf3d/0x1420 [ 132.283057][ T3131] bpf_prog_load+0xf5a/0x1420 [ 132.287732][ T3131] ? map_freeze+0x320/0x320 [ 132.292229][ T3131] ? irq_exit_rcu+0x9/0x10 [ 132.296636][ T3131] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 132.302430][ T3131] ? selinux_bpf+0xc7/0xf0 [ 132.306836][ T3131] ? security_bpf+0x82/0xa0 [ 132.311325][ T3131] __se_sys_bpf+0x442/0x680 [ 132.315814][ T3131] ? __x64_sys_bpf+0x90/0x90 [ 132.320398][ T3131] ? fpu__clear_all+0x20/0x20 [ 132.325068][ T3131] __x64_sys_bpf+0x7b/0x90 [ 132.329472][ T3131] do_syscall_64+0x31/0x40 [ 132.333892][ T3131] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 132.339773][ T3131] RIP: 0033:0x7f71c50d9929 [ 132.344189][ T3131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 132.363783][ T3131] RSP: 002b:00007f71c3742038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 132.372188][ T3131] RAX: ffffffffffffffda RBX: 00007f71c5300fa0 RCX: 00007f71c50d9929 [ 132.380168][ T3131] RDX: 0000000000000048 RSI: 00002000000017c0 RDI: 0000000000000005 [ 132.388172][ T3131] RBP: 00007f71c3742090 R08: 0000000000000000 R09: 0000000000000000 [ 132.396138][ T3131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 132.404101][ T3131] R13: 0000000000000000 R14: 00007f71c5300fa0 R15: 00007ffee1c4e1f8 [ 132.443908][ T3135] device sit0 entered promiscuous mode [ 132.491496][ T3131] syz.2.1046: vmalloc: allocation failure: 560 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz2,mems_allowed=0 [ 132.507324][ T3131] CPU: 0 PID: 3131 Comm: syz.2.1046 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 132.518623][ T3131] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 132.528691][ T3131] Call Trace: [ 132.531997][ T3131] __dump_stack+0x21/0x24 [ 132.536351][ T3131] dump_stack_lvl+0x169/0x1d8 [ 132.541064][ T3131] ? show_regs_print_info+0x18/0x18 [ 132.546280][ T3131] ? pr_cont_kernfs_name+0xe3/0xf0 [ 132.551413][ T3131] dump_stack+0x15/0x1c [ 132.555587][ T3131] warn_alloc+0x1b0/0x1d0 [ 132.559932][ T3131] ? __get_vm_area_node+0x113/0x450 [ 132.565144][ T3131] ? zone_watermark_ok_safe+0x250/0x250 [ 132.570703][ T3131] ? __get_vm_area_node+0x345/0x450 [ 132.575920][ T3131] __vmalloc_node_range+0x27d/0x780 [ 132.581133][ T3131] ? kmalloc_order_trace+0x16/0x80 [ 132.586260][ T3131] ? bpf_check+0x1b7/0xd720 [ 132.590780][ T3131] vzalloc+0x78/0x90 [ 132.594683][ T3131] ? bpf_check+0x1b7/0xd720 [ 132.599198][ T3131] bpf_check+0x1b7/0xd720 [ 132.603538][ T3131] ? __kasan_check_read+0x11/0x20 [ 132.608581][ T3131] ? preempt_schedule_irq+0xbb/0x110 [ 132.613884][ T3131] ? preempt_schedule_notrace+0x110/0x110 [ 132.619619][ T3131] ? bpf_get_btf_vmlinux+0x60/0x60 [ 132.624739][ T3131] ? 0xffffffffa0028000 [ 132.628912][ T3131] ? is_bpf_text_address+0x177/0x190 [ 132.634209][ T3131] ? selinux_bpf_prog_alloc+0x51/0x140 [ 132.639681][ T3131] ? __kernel_text_address+0xa0/0x100 [ 132.645070][ T3131] ? unwind_get_return_address+0x4d/0x90 [ 132.650706][ T3131] ? stack_trace_save+0xe0/0xe0 [ 132.655563][ T3131] ? arch_stack_walk+0xee/0x140 [ 132.660428][ T3131] ? stack_trace_save+0x98/0xe0 [ 132.665292][ T3131] ? stack_trace_snprint+0xf0/0xf0 [ 132.670412][ T3131] ? __kasan_slab_alloc+0x69/0xf0 [ 132.675442][ T3131] ? kvm_sched_clock_read+0x18/0x40 [ 132.680646][ T3131] ? sched_clock_cpu+0x1b/0x3d0 [ 132.685494][ T3131] ? kvm_sched_clock_read+0x18/0x40 [ 132.690707][ T3131] ? sched_clock+0x3a/0x40 [ 132.695116][ T3131] ? sched_clock_cpu+0x1b/0x3d0 [ 132.699956][ T3131] ? sched_clock+0x3a/0x40 [ 132.704362][ T3131] ? sched_clock_cpu+0x1b/0x3d0 [ 132.709207][ T3131] ? __irq_exit_rcu+0x40/0x150 [ 132.713963][ T3131] ? irq_exit_rcu+0x9/0x10 [ 132.718374][ T3131] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 132.724175][ T3131] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 132.730322][ T3131] ? bpf_prog_load+0xf3d/0x1420 [ 132.735171][ T3131] bpf_prog_load+0xf5a/0x1420 [ 132.739844][ T3131] ? map_freeze+0x320/0x320 [ 132.744344][ T3131] ? irq_exit_rcu+0x9/0x10 [ 132.748756][ T3131] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 132.754562][ T3131] ? selinux_bpf+0xc7/0xf0 [ 132.758969][ T3131] ? security_bpf+0x82/0xa0 [ 132.763469][ T3131] __se_sys_bpf+0x442/0x680 [ 132.767962][ T3131] ? __x64_sys_bpf+0x90/0x90 [ 132.772545][ T3131] ? fpu__clear_all+0x20/0x20 [ 132.777210][ T3131] __x64_sys_bpf+0x7b/0x90 [ 132.781615][ T3131] do_syscall_64+0x31/0x40 [ 132.786022][ T3131] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 132.791904][ T3131] RIP: 0033:0x7f71c50d9929 [ 132.796308][ T3131] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 132.815904][ T3131] RSP: 002b:00007f71c3742038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 132.824326][ T3131] RAX: ffffffffffffffda RBX: 00007f71c5300fa0 RCX: 00007f71c50d9929 [ 132.832296][ T3131] RDX: 0000000000000048 RSI: 00002000000017c0 RDI: 0000000000000005 [ 132.840262][ T3131] RBP: 00007f71c3742090 R08: 0000000000000000 R09: 0000000000000000 [ 132.848226][ T3131] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 132.856194][ T3131] R13: 0000000000000000 R14: 00007f71c5300fa0 R15: 00007ffee1c4e1f8 [ 132.873244][ T3140] syz.0.1048[3140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.873311][ T3140] syz.0.1048[3140] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 132.884881][ T3127] device sit0 left promiscuous mode [ 132.956788][ T3131] Mem-Info: [ 132.964570][ T3131] active_anon:37 inactive_anon:17915 isolated_anon:0 [ 132.964570][ T3131] active_file:25218 inactive_file:3434 isolated_file:0 [ 132.964570][ T3131] unevictable:0 dirty:317 writeback:0 [ 132.964570][ T3131] slab_reclaimable:7397 slab_unreclaimable:73707 [ 132.964570][ T3131] mapped:38560 shmem:13247 pagetables:641 bounce:0 [ 132.964570][ T3131] free:1551252 free_pcp:1222 free_cma:0 [ 133.011909][ T3131] Node 0 active_anon:148kB inactive_anon:72400kB active_file:100872kB inactive_file:13736kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:154328kB dirty:1276kB writeback:0kB shmem:53564kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4160kB all_unreclaimable? no [ 133.219040][ T3131] DMA32 free:2985936kB min:62668kB low:78332kB high:93996kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2988828kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:2892kB local_pcp:1440kB free_cma:0kB [ 133.288021][ T3154] FAULT_INJECTION: forcing a failure. [ 133.288021][ T3154] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 133.304431][ T3131] lowmem_reserve[]: 0 3941 3941 [ 133.313764][ T3131] Normal free:3205780kB min:84784kB low:105980kB high:127176kB reserved_highatomic:0KB active_anon:148kB inactive_anon:84720kB active_file:100872kB inactive_file:13736kB unevictable:0kB writepending:1276kB present:5242880kB managed:4036368kB mlocked:0kB pagetables:2696kB bounce:0kB free_pcp:1368kB local_pcp:1116kB free_cma:0kB [ 133.356734][ T3154] CPU: 1 PID: 3154 Comm: syz.0.1054 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 133.368033][ T3154] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 133.376719][ T3131] lowmem_reserve[]: [ 133.378077][ T3154] Call Trace: [ 133.378099][ T3154] __dump_stack+0x21/0x24 [ 133.378119][ T3154] dump_stack_lvl+0x169/0x1d8 [ 133.381916][ T3131] 0 [ 133.385195][ T3154] ? show_regs_print_info+0x18/0x18 [ 133.385206][ T3154] ? vfs_write+0xac8/0xd60 [ 133.385226][ T3154] dump_stack+0x15/0x1c [ 133.390143][ T3131] 0 [ 133.394249][ T3154] should_fail+0x3c1/0x510 [ 133.394267][ T3154] should_fail_usercopy+0x1a/0x20 [ 133.396865][ T3131] 0 [ 133.401949][ T3154] _copy_from_user+0x20/0xd0 [ 133.401961][ T3154] __se_sys_bpf+0x181/0x680 [ 133.401970][ T3154] ? __x64_sys_bpf+0x90/0x90 [ 133.401993][ T3154] ? fpu__clear_all+0x20/0x20 [ 133.406453][ T3131] [ 133.410535][ T3154] __x64_sys_bpf+0x7b/0x90 [ 133.410547][ T3154] do_syscall_64+0x31/0x40 [ 133.410569][ T3154] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 133.413070][ T3131] DMA32: [ 133.417475][ T3154] RIP: 0033:0x7fdff3f3c929 [ 133.417488][ T3154] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 133.417496][ T3154] RSP: 002b:00007fdff25a5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 133.417518][ T3154] RAX: ffffffffffffffda RBX: 00007fdff4163fa0 RCX: 00007fdff3f3c929 [ 133.422603][ T3131] 6*4kB [ 133.425017][ T3154] RDX: 0000000000000010 RSI: 0000200000000140 RDI: 0000000000000011 [ 133.425025][ T3154] RBP: 00007fdff25a5090 R08: 0000000000000000 R09: 0000000000000000 [ 133.425039][ T3154] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 133.530429][ T3154] R13: 0000000000000000 R14: 00007fdff4163fa0 R15: 00007ffc41031a78 [ 133.553165][ T3131] (UM) 3*8kB (M) 4*16kB (M) 9*32kB (UM) 9*64kB (UM) 6*128kB (UM) 7*256kB (UM) 5*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 725*4096kB (M) = 2985936kB [ 133.576717][ T3131] Normal: 1631*4kB (UME) 521*8kB (UME) 166*16kB (UME) 115*32kB (UME) 127*64kB (UME) 141*128kB (UM) 66*256kB (UME) 37*512kB (UM) 15*1024kB (UM) 3*2048kB (ME) 760*4096kB (M) = 3213508kB [ 133.713383][ T3131] 41995 total pagecache pages [ 133.731294][ T3131] 0 pages in swap cache [ 133.740982][ T3131] Swap cache stats: add 0, delete 0, find 0/0 [ 133.756011][ T3131] Free swap = 124996kB [ 133.881380][ T3131] Total swap = 124996kB [ 133.885575][ T3131] 2097051 pages RAM [ 133.930657][ T3131] 0 pages HighMem/MovableOnly [ 133.935610][ T3131] 340752 pages reserved [ 133.951347][ T3131] 0 pages cma reserved [ 135.123304][ T3199] FAULT_INJECTION: forcing a failure. [ 135.123304][ T3199] name failslab, interval 1, probability 0, space 0, times 0 [ 135.136747][ T3199] CPU: 1 PID: 3199 Comm: syz.3.1068 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 135.148177][ T3199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 135.158250][ T3199] Call Trace: [ 135.161584][ T3199] __dump_stack+0x21/0x24 [ 135.165914][ T3199] dump_stack_lvl+0x169/0x1d8 [ 135.170595][ T3199] ? thaw_kernel_threads+0x220/0x220 [ 135.175885][ T3199] ? show_regs_print_info+0x18/0x18 [ 135.181097][ T3199] dump_stack+0x15/0x1c [ 135.185256][ T3199] should_fail+0x3c1/0x510 [ 135.189676][ T3199] ? __alloc_skb+0x9e/0x520 [ 135.194194][ T3199] __should_failslab+0xa4/0xe0 [ 135.198960][ T3199] should_failslab+0x9/0x20 [ 135.203480][ T3199] kmem_cache_alloc+0x3d/0x2e0 [ 135.208251][ T3199] ? unwind_get_return_address+0x4d/0x90 [ 135.213918][ T3199] __alloc_skb+0x9e/0x520 [ 135.218261][ T3199] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 135.223548][ T3199] rtmsg_ifinfo+0x7a/0x130 [ 135.227995][ T3199] __dev_notify_flags+0xdb/0x500 [ 135.232967][ T3199] ? vlan_dev_change_rx_flags+0xcf/0x150 [ 135.238604][ T3199] ? __dev_change_flags+0x6a0/0x6a0 [ 135.243805][ T3199] ? __dev_change_flags+0x4be/0x6a0 [ 135.249000][ T3199] ? dev_get_flags+0x1e0/0x1e0 [ 135.253763][ T3199] ? selinux_capable+0x29c/0x380 [ 135.258714][ T3199] ? selinux_capset+0xf0/0xf0 [ 135.263406][ T3199] dev_change_flags+0xe8/0x1a0 [ 135.268193][ T3199] dev_ifsioc+0x113/0xa50 [ 135.272520][ T3199] ? dev_ioctl+0xb80/0xb80 [ 135.276938][ T3199] dev_ioctl+0x550/0xb80 [ 135.281184][ T3199] sock_do_ioctl+0x235/0x330 [ 135.285771][ T3199] ? __kasan_slab_free+0x11/0x20 [ 135.290718][ T3199] ? sock_show_fdinfo+0xa0/0xa0 [ 135.295579][ T3199] ? selinux_file_ioctl+0x377/0x480 [ 135.300778][ T3199] ? mutex_trylock+0xa0/0xa0 [ 135.305382][ T3199] ? __fget_files+0x2c4/0x320 [ 135.310056][ T3199] sock_ioctl+0x504/0x710 [ 135.314386][ T3199] ? sock_poll+0x360/0x360 [ 135.318809][ T3199] ? __fget_files+0x2c4/0x320 [ 135.323493][ T3199] ? security_file_ioctl+0x84/0xa0 [ 135.328609][ T3199] ? sock_poll+0x360/0x360 [ 135.333027][ T3199] __se_sys_ioctl+0x121/0x1a0 [ 135.337800][ T3199] __x64_sys_ioctl+0x7b/0x90 [ 135.342433][ T3199] do_syscall_64+0x31/0x40 [ 135.346850][ T3199] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 135.352742][ T3199] RIP: 0033:0x7f3efd81c929 [ 135.357167][ T3199] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 135.376789][ T3199] RSP: 002b:00007f3efbe85038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 135.385208][ T3199] RAX: ffffffffffffffda RBX: 00007f3efda43fa0 RCX: 00007f3efd81c929 [ 135.393178][ T3199] RDX: 0000200000000100 RSI: 0000000000008914 RDI: 0000000000000004 [ 135.401161][ T3199] RBP: 00007f3efbe85090 R08: 0000000000000000 R09: 0000000000000000 [ 135.409138][ T3199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 135.417111][ T3199] R13: 0000000000000000 R14: 00007f3efda43fa0 R15: 00007ffeef890028 [ 135.520542][ T3205] device syzkaller0 entered promiscuous mode [ 136.161264][ T3236] device syzkaller0 entered promiscuous mode [ 136.885145][ T24] audit: type=1400 audit(1750134081.700:136): avc: denied { create } for pid=3264 comm="syz.4.1094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 137.091851][ T24] audit: type=1400 audit(1750134081.740:137): avc: denied { create } for pid=3264 comm="syz.4.1094" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 137.138007][ T3272] bridge0: port 3(veth0) entered blocking state [ 137.145360][ T3272] bridge0: port 3(veth0) entered disabled state [ 137.163081][ T3272] device veth0 entered promiscuous mode [ 137.171488][ T3272] bridge0: port 3(veth0) entered blocking state [ 137.178148][ T3272] bridge0: port 3(veth0) entered forwarding state [ 137.214120][ T3273] device wg2 entered promiscuous mode [ 137.396768][ T3299] syz.2.1109[3299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.396853][ T3299] syz.2.1109[3299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.418446][ T3304] FAULT_INJECTION: forcing a failure. [ 137.418446][ T3304] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 137.506719][ T3304] CPU: 0 PID: 3304 Comm: syz.1.1110 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 137.518152][ T3304] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 137.528215][ T3304] Call Trace: [ 137.531517][ T3304] __dump_stack+0x21/0x24 [ 137.535855][ T3304] dump_stack_lvl+0x169/0x1d8 [ 137.540538][ T3304] ? show_regs_print_info+0x18/0x18 [ 137.545741][ T3304] ? slab_post_alloc_hook+0x5d/0x2f0 [ 137.551031][ T3304] ? __alloc_skb+0x9e/0x520 [ 137.555537][ T3304] ? alloc_skb_with_frags+0xa2/0x560 [ 137.560835][ T3304] ? sock_alloc_send_pskb+0x853/0x980 [ 137.566214][ T3304] ? tun_chr_write_iter+0x1bf/0x270 [ 137.571424][ T3304] dump_stack+0x15/0x1c [ 137.575596][ T3304] should_fail+0x3c1/0x510 [ 137.580047][ T3304] should_fail_alloc_page+0x4f/0x60 [ 137.585249][ T3304] __alloc_pages_nodemask+0x109/0x5f0 [ 137.590626][ T3304] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 137.596187][ T3304] kmalloc_order+0x4c/0x160 [ 137.600695][ T3304] ? slab_post_alloc_hook+0x7d/0x2f0 [ 137.605986][ T3304] kmalloc_order_trace+0x16/0x80 [ 137.610944][ T3304] __kmalloc_track_caller+0x1d7/0x320 [ 137.616329][ T3304] ? __alloc_skb+0x9e/0x520 [ 137.620841][ T3304] ? alloc_skb_with_frags+0xa2/0x560 [ 137.626128][ T3304] __alloc_skb+0xdc/0x520 [ 137.630463][ T3304] alloc_skb_with_frags+0xa2/0x560 [ 137.635596][ T3304] sock_alloc_send_pskb+0x853/0x980 [ 137.640803][ T3304] ? is_bpf_text_address+0x177/0x190 [ 137.646092][ T3304] ? __kernel_text_address+0xa0/0x100 [ 137.651467][ T3304] ? sock_kzfree_s+0x60/0x60 [ 137.656070][ T3304] ? stack_trace_save+0x98/0xe0 [ 137.660926][ T3304] tun_get_user+0x4bd/0x3090 [ 137.665543][ T3304] ? __x64_sys_openat+0x136/0x160 [ 137.670584][ T3304] ? tun_do_read+0x1c00/0x1c00 [ 137.675359][ T3304] ? kstrtouint_from_user+0x1a0/0x200 [ 137.680746][ T3304] ? __fsnotify_parent+0x5f5/0x6c0 [ 137.685861][ T3304] ? avc_policy_seqno+0x1b/0x70 [ 137.690722][ T3304] ? selinux_file_permission+0x2a5/0x510 [ 137.696369][ T3304] ? fsnotify_perm+0x66/0x4b0 [ 137.701059][ T3304] tun_chr_write_iter+0x1bf/0x270 [ 137.706090][ T3304] vfs_write+0x725/0xd60 [ 137.710345][ T3304] ? kernel_write+0x3c0/0x3c0 [ 137.715029][ T3304] ? __fget_files+0x2c4/0x320 [ 137.719708][ T3304] ? __fdget_pos+0x1f7/0x380 [ 137.724301][ T3304] ? ksys_write+0x71/0x240 [ 137.728725][ T3304] ksys_write+0x140/0x240 [ 137.733064][ T3304] ? __ia32_sys_read+0x90/0x90 [ 137.737837][ T3304] ? fpu__clear_all+0x20/0x20 [ 137.742524][ T3304] __x64_sys_write+0x7b/0x90 [ 137.747126][ T3304] do_syscall_64+0x31/0x40 [ 137.751560][ T3304] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 137.757451][ T3304] RIP: 0033:0x7fb6adc65929 [ 137.761875][ T3304] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 137.781477][ T3304] RSP: 002b:00007fb6ac2ce038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 137.789904][ T3304] RAX: ffffffffffffffda RBX: 00007fb6ade8cfa0 RCX: 00007fb6adc65929 [ 137.797882][ T3304] RDX: 000000000000fdef RSI: 0000200000000300 RDI: 00000000000000c8 [ 137.805855][ T3304] RBP: 00007fb6ac2ce090 R08: 0000000000000000 R09: 0000000000000000 [ 137.813831][ T3304] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 137.821804][ T3304] R13: 0000000000000000 R14: 00007fb6ade8cfa0 R15: 00007ffdc1b7b888 [ 137.928694][ T3316] syz.1.1114[3316] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 137.928746][ T3316] syz.1.1114[3316] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.272855][ T3332] €Â0: renamed from pim6reg1 [ 138.345926][ T3331] device sit0 entered promiscuous mode [ 138.633657][ T24] audit: type=1400 audit(1750134083.450:138): avc: denied { create } for pid=3341 comm="syz.3.1126" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 138.828398][ T3364] syz.4.1132[3364] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 138.828485][ T3364] syz.4.1132[3364] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 139.024088][ T3367] device veth0_vlan left promiscuous mode [ 139.057819][ T3367] device veth0_vlan entered promiscuous mode [ 139.898854][ T3384] FAULT_INJECTION: forcing a failure. [ 139.898854][ T3384] name failslab, interval 1, probability 0, space 0, times 0 [ 139.962092][ T3384] CPU: 1 PID: 3384 Comm: syz.4.1138 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 139.973419][ T3384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 139.983483][ T3384] Call Trace: [ 139.986787][ T3384] __dump_stack+0x21/0x24 [ 139.991130][ T3384] dump_stack_lvl+0x169/0x1d8 [ 139.995814][ T3384] ? show_regs_print_info+0x18/0x18 [ 140.001020][ T3384] ? selinux_capable+0x29c/0x380 [ 140.005959][ T3384] ? selinux_capset+0xf0/0xf0 [ 140.010640][ T3384] dump_stack+0x15/0x1c [ 140.014802][ T3384] should_fail+0x3c1/0x510 [ 140.019230][ T3384] ? htab_map_alloc+0x99/0x970 [ 140.023998][ T3384] __should_failslab+0xa4/0xe0 [ 140.028768][ T3384] should_failslab+0x9/0x20 [ 140.033273][ T3384] kmem_cache_alloc_trace+0x3a/0x2e0 [ 140.038566][ T3384] ? security_capable+0x87/0xb0 [ 140.043425][ T3384] htab_map_alloc+0x99/0x970 [ 140.048022][ T3384] ? htab_map_alloc_check+0x3f0/0x4e0 [ 140.053399][ T3384] map_create+0x441/0x2190 [ 140.057833][ T3384] __se_sys_bpf+0x203/0x680 [ 140.062337][ T3384] ? __x64_sys_bpf+0x90/0x90 [ 140.066946][ T3384] ? fpu__clear_all+0x20/0x20 [ 140.071635][ T3384] __x64_sys_bpf+0x7b/0x90 [ 140.076058][ T3384] do_syscall_64+0x31/0x40 [ 140.080482][ T3384] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 140.086390][ T3384] RIP: 0033:0x7fbca2c9d929 [ 140.090810][ T3384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 140.110515][ T3384] RSP: 002b:00007fbca1306038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 140.118942][ T3384] RAX: ffffffffffffffda RBX: 00007fbca2ec4fa0 RCX: 00007fbca2c9d929 [ 140.126918][ T3384] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 140.134893][ T3384] RBP: 00007fbca1306090 R08: 0000000000000000 R09: 0000000000000000 [ 140.142868][ T3384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 140.150842][ T3384] R13: 0000000000000000 R14: 00007fbca2ec4fa0 R15: 00007ffe080e8aa8 [ 140.553217][ T3387] device syzkaller0 entered promiscuous mode [ 141.109852][ T3419] FAULT_INJECTION: forcing a failure. [ 141.109852][ T3419] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 141.299581][ T3419] CPU: 1 PID: 3419 Comm: syz.3.1150 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 141.311003][ T3419] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 141.321063][ T3419] Call Trace: [ 141.324384][ T3419] __dump_stack+0x21/0x24 [ 141.328724][ T3419] dump_stack_lvl+0x169/0x1d8 [ 141.333418][ T3419] ? show_regs_print_info+0x18/0x18 [ 141.338642][ T3419] ? slab_post_alloc_hook+0x5d/0x2f0 [ 141.343932][ T3419] ? __alloc_skb+0x9e/0x520 [ 141.348449][ T3419] ? alloc_skb_with_frags+0xa2/0x560 [ 141.353735][ T3419] ? sock_alloc_send_pskb+0x853/0x980 [ 141.359103][ T3419] ? tun_chr_write_iter+0x1bf/0x270 [ 141.364310][ T3419] dump_stack+0x15/0x1c [ 141.368473][ T3419] should_fail+0x3c1/0x510 [ 141.372898][ T3419] should_fail_alloc_page+0x4f/0x60 [ 141.378099][ T3419] __alloc_pages_nodemask+0x109/0x5f0 [ 141.383487][ T3419] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 141.389046][ T3419] kmalloc_order+0x4c/0x160 [ 141.393562][ T3419] ? slab_post_alloc_hook+0x7d/0x2f0 [ 141.398943][ T3419] kmalloc_order_trace+0x16/0x80 [ 141.403893][ T3419] __kmalloc_track_caller+0x1d7/0x320 [ 141.409267][ T3419] ? __alloc_skb+0x9e/0x520 [ 141.413762][ T3419] ? alloc_skb_with_frags+0xa2/0x560 [ 141.419043][ T3419] __alloc_skb+0xdc/0x520 [ 141.423390][ T3419] alloc_skb_with_frags+0xa2/0x560 [ 141.428495][ T3419] sock_alloc_send_pskb+0x853/0x980 [ 141.433685][ T3419] ? is_bpf_text_address+0x177/0x190 [ 141.438959][ T3419] ? __kernel_text_address+0xa0/0x100 [ 141.444337][ T3419] ? sock_kzfree_s+0x60/0x60 [ 141.448925][ T3419] ? stack_trace_save+0x98/0xe0 [ 141.453773][ T3419] tun_get_user+0x4bd/0x3090 [ 141.458365][ T3419] ? tun_do_read+0x1c00/0x1c00 [ 141.463129][ T3419] ? kstrtouint_from_user+0x1a0/0x200 [ 141.468501][ T3419] ? __fsnotify_parent+0x5f5/0x6c0 [ 141.473604][ T3419] ? avc_policy_seqno+0x1b/0x70 [ 141.478455][ T3419] ? selinux_file_permission+0x2a5/0x510 [ 141.484085][ T3419] ? fsnotify_perm+0x66/0x4b0 [ 141.488757][ T3419] tun_chr_write_iter+0x1bf/0x270 [ 141.493770][ T3419] vfs_write+0x725/0xd60 [ 141.498027][ T3419] ? kernel_write+0x3c0/0x3c0 [ 141.502697][ T3419] ? __fget_files+0x2c4/0x320 [ 141.507381][ T3419] ? __fdget_pos+0x1f7/0x380 [ 141.511965][ T3419] ? ksys_write+0x71/0x240 [ 141.516371][ T3419] ksys_write+0x140/0x240 [ 141.520694][ T3419] ? __ia32_sys_read+0x90/0x90 [ 141.525454][ T3419] ? fpu__clear_all+0x20/0x20 [ 141.530127][ T3419] __x64_sys_write+0x7b/0x90 [ 141.534712][ T3419] do_syscall_64+0x31/0x40 [ 141.539121][ T3419] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 141.545002][ T3419] RIP: 0033:0x7f3efd81c929 [ 141.549415][ T3419] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 141.569043][ T3419] RSP: 002b:00007f3efbe85038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 141.577460][ T3419] RAX: ffffffffffffffda RBX: 00007f3efda43fa0 RCX: 00007f3efd81c929 [ 141.585459][ T3419] RDX: 000000000000fdef RSI: 0000200000000000 RDI: 00000000000000c8 [ 141.593438][ T3419] RBP: 00007f3efbe85090 R08: 0000000000000000 R09: 0000000000000000 [ 141.601403][ T3419] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 141.609392][ T3419] R13: 0000000000000000 R14: 00007f3efda43fa0 R15: 00007ffeef890028 [ 142.129193][ T3432] FAULT_INJECTION: forcing a failure. [ 142.129193][ T3432] name failslab, interval 1, probability 0, space 0, times 0 [ 142.206751][ T3432] CPU: 1 PID: 3432 Comm: syz.2.1154 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 142.218062][ T3432] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 142.228110][ T3432] Call Trace: [ 142.231435][ T3432] __dump_stack+0x21/0x24 [ 142.235756][ T3432] dump_stack_lvl+0x169/0x1d8 [ 142.240422][ T3432] ? thaw_kernel_threads+0x220/0x220 [ 142.245691][ T3432] ? kstrtouint_from_user+0x1a0/0x200 [ 142.251051][ T3432] ? show_regs_print_info+0x18/0x18 [ 142.256236][ T3432] ? memset+0x35/0x40 [ 142.260205][ T3432] dump_stack+0x15/0x1c [ 142.264349][ T3432] should_fail+0x3c1/0x510 [ 142.268754][ T3432] ? getname_flags+0xb9/0x500 [ 142.273426][ T3432] __should_failslab+0xa4/0xe0 [ 142.278183][ T3432] should_failslab+0x9/0x20 [ 142.282697][ T3432] kmem_cache_alloc+0x3d/0x2e0 [ 142.287449][ T3432] getname_flags+0xb9/0x500 [ 142.291957][ T3432] ? __bpf_trace_kmem_free+0x6f/0x90 [ 142.297228][ T3432] user_path_at_empty+0x2f/0x50 [ 142.302067][ T3432] bpf_obj_get_user+0xac/0x440 [ 142.306815][ T3432] ? bpf_obj_pin_user+0x2c0/0x2c0 [ 142.311826][ T3432] bpf_obj_get+0xd3/0x120 [ 142.316151][ T3432] __se_sys_bpf+0x3d1/0x680 [ 142.320657][ T3432] ? __x64_sys_bpf+0x90/0x90 [ 142.325238][ T3432] ? fpu__clear_all+0x20/0x20 [ 142.329918][ T3432] __x64_sys_bpf+0x7b/0x90 [ 142.334331][ T3432] do_syscall_64+0x31/0x40 [ 142.338741][ T3432] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 142.344622][ T3432] RIP: 0033:0x7f71c50d9929 [ 142.349035][ T3432] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 142.368633][ T3432] RSP: 002b:00007f71c3742038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 142.377037][ T3432] RAX: ffffffffffffffda RBX: 00007f71c5300fa0 RCX: 00007f71c50d9929 [ 142.384992][ T3432] RDX: 0000000000000018 RSI: 00002000000014c0 RDI: 0000000000000007 [ 142.392954][ T3432] RBP: 00007f71c3742090 R08: 0000000000000000 R09: 0000000000000000 [ 142.400915][ T3432] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 142.409051][ T3432] R13: 0000000000000000 R14: 00007f71c5300fa0 R15: 00007ffee1c4e1f8 [ 142.486177][ T3446] €Â0: renamed from pim6reg1 [ 142.729991][ T3447] device syzkaller0 entered promiscuous mode [ 143.059495][ T3474] FAULT_INJECTION: forcing a failure. [ 143.059495][ T3474] name failslab, interval 1, probability 0, space 0, times 0 [ 143.159289][ T3474] CPU: 1 PID: 3474 Comm: syz.4.1169 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 143.170630][ T3474] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 143.180691][ T3474] Call Trace: [ 143.183987][ T3474] __dump_stack+0x21/0x24 [ 143.188323][ T3474] dump_stack_lvl+0x169/0x1d8 [ 143.193006][ T3474] ? show_regs_print_info+0x18/0x18 [ 143.198211][ T3474] ? 0xffffffffa0028000 [ 143.202383][ T3474] dump_stack+0x15/0x1c [ 143.206539][ T3474] should_fail+0x3c1/0x510 [ 143.210954][ T3474] ? __alloc_skb+0x9e/0x520 [ 143.215460][ T3474] __should_failslab+0xa4/0xe0 [ 143.220230][ T3474] should_failslab+0x9/0x20 [ 143.224734][ T3474] kmem_cache_alloc+0x3d/0x2e0 [ 143.229492][ T3474] ? br_get_rx_handler+0x20/0x20 [ 143.234427][ T3474] __alloc_skb+0x9e/0x520 [ 143.239198][ T3474] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 143.244485][ T3474] rtnetlink_event+0xd2/0x1a0 [ 143.249165][ T3474] raw_notifier_call_chain+0x90/0x100 [ 143.254540][ T3474] dev_set_mac_address+0x318/0x420 [ 143.259649][ T3474] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 143.265456][ T3474] dev_set_mac_address_user+0x31/0x50 [ 143.270821][ T3474] dev_ifsioc+0x65c/0xa50 [ 143.275148][ T3474] ? dev_ioctl+0xb80/0xb80 [ 143.279568][ T3474] dev_ioctl+0x550/0xb80 [ 143.283806][ T3474] sock_do_ioctl+0x235/0x330 [ 143.288404][ T3474] ? __kasan_slab_free+0x11/0x20 [ 143.293341][ T3474] ? sock_show_fdinfo+0xa0/0xa0 [ 143.298196][ T3474] ? selinux_file_ioctl+0x377/0x480 [ 143.303391][ T3474] ? mutex_trylock+0xa0/0xa0 [ 143.307974][ T3474] ? __fget_files+0x2c4/0x320 [ 143.312646][ T3474] sock_ioctl+0x504/0x710 [ 143.316975][ T3474] ? sock_poll+0x360/0x360 [ 143.321385][ T3474] ? __fget_files+0x2c4/0x320 [ 143.326144][ T3474] ? security_file_ioctl+0x84/0xa0 [ 143.331254][ T3474] ? sock_poll+0x360/0x360 [ 143.335660][ T3474] __se_sys_ioctl+0x121/0x1a0 [ 143.340351][ T3474] __x64_sys_ioctl+0x7b/0x90 [ 143.344935][ T3474] do_syscall_64+0x31/0x40 [ 143.349357][ T3474] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 143.355244][ T3474] RIP: 0033:0x7fbca2c9d929 [ 143.359677][ T3474] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 143.379282][ T3474] RSP: 002b:00007fbca1306038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 143.387703][ T3474] RAX: ffffffffffffffda RBX: 00007fbca2ec4fa0 RCX: 00007fbca2c9d929 [ 143.395670][ T3474] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 0000000000000006 [ 143.403639][ T3474] RBP: 00007fbca1306090 R08: 0000000000000000 R09: 0000000000000000 [ 143.411607][ T3474] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 143.419578][ T3474] R13: 0000000000000000 R14: 00007fbca2ec4fa0 R15: 00007ffe080e8aa8 [ 144.458286][ T3515] device syzkaller0 entered promiscuous mode [ 145.340077][ T3537] bridge0: port 1(bridge_slave_0) entered disabled state [ 145.480624][ T3541] device sit0 entered promiscuous mode [ 145.607180][ T3547] FAULT_INJECTION: forcing a failure. [ 145.607180][ T3547] name failslab, interval 1, probability 0, space 0, times 0 [ 145.686689][ T3547] CPU: 1 PID: 3547 Comm: syz.3.1194 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 145.698000][ T3547] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 145.708058][ T3547] Call Trace: [ 145.711359][ T3547] __dump_stack+0x21/0x24 [ 145.715691][ T3547] dump_stack_lvl+0x169/0x1d8 [ 145.720400][ T3547] ? show_regs_print_info+0x18/0x18 [ 145.725604][ T3547] ? selinux_capable+0x29c/0x380 [ 145.730549][ T3547] ? selinux_capset+0xf0/0xf0 [ 145.735572][ T3547] dump_stack+0x15/0x1c [ 145.739724][ T3547] should_fail+0x3c1/0x510 [ 145.744129][ T3547] ? htab_map_alloc+0x99/0x970 [ 145.748897][ T3547] __should_failslab+0xa4/0xe0 [ 145.753655][ T3547] should_failslab+0x9/0x20 [ 145.758165][ T3547] kmem_cache_alloc_trace+0x3a/0x2e0 [ 145.763438][ T3547] ? security_capable+0x87/0xb0 [ 145.768278][ T3547] htab_map_alloc+0x99/0x970 [ 145.772859][ T3547] ? htab_map_alloc_check+0x3f0/0x4e0 [ 145.778222][ T3547] map_create+0x441/0x2190 [ 145.782651][ T3547] __se_sys_bpf+0x203/0x680 [ 145.787158][ T3547] ? __x64_sys_bpf+0x90/0x90 [ 145.791736][ T3547] ? fpu__clear_all+0x20/0x20 [ 145.796401][ T3547] __x64_sys_bpf+0x7b/0x90 [ 145.800804][ T3547] do_syscall_64+0x31/0x40 [ 145.805204][ T3547] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 145.811118][ T3547] RIP: 0033:0x7f3efd81c929 [ 145.815524][ T3547] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 145.835134][ T3547] RSP: 002b:00007f3efbe85038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 145.843537][ T3547] RAX: ffffffffffffffda RBX: 00007f3efda43fa0 RCX: 00007f3efd81c929 [ 145.851496][ T3547] RDX: 0000000000000050 RSI: 0000200000001040 RDI: 0000000000000000 [ 145.859457][ T3547] RBP: 00007f3efbe85090 R08: 0000000000000000 R09: 0000000000000000 [ 145.867416][ T3547] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 145.875375][ T3547] R13: 0000000000000000 R14: 00007f3efda43fa0 R15: 00007ffeef890028 [ 146.332105][ T3565] device sit0 left promiscuous mode [ 146.469436][ T3571] device sit0 entered promiscuous mode [ 146.662870][ T3578] device syzkaller0 entered promiscuous mode [ 146.729327][ T3579] device veth0_to_team entered promiscuous mode [ 147.505207][ T3609] FAULT_INJECTION: forcing a failure. [ 147.505207][ T3609] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 147.552167][ T3622] device veth0_vlan left promiscuous mode [ 147.626536][ T3622] device veth0_vlan entered promiscuous mode [ 147.680936][ T3609] CPU: 1 PID: 3609 Comm: syz.2.1217 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 147.692249][ T3609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 147.702302][ T3609] Call Trace: [ 147.705609][ T3609] __dump_stack+0x21/0x24 [ 147.709951][ T3609] dump_stack_lvl+0x169/0x1d8 [ 147.714642][ T3609] ? show_regs_print_info+0x18/0x18 [ 147.719875][ T3609] ? format_decode+0x1bb/0x1520 [ 147.724736][ T3609] dump_stack+0x15/0x1c [ 147.728899][ T3609] should_fail+0x3c1/0x510 [ 147.733332][ T3609] should_fail_usercopy+0x1a/0x20 [ 147.738365][ T3609] _copy_from_user+0x20/0xd0 [ 147.742963][ T3609] kstrtouint_from_user+0xbe/0x200 [ 147.748080][ T3609] ? kstrtol_from_user+0x260/0x260 [ 147.753200][ T3609] ? memset+0x35/0x40 [ 147.757190][ T3609] ? avc_policy_seqno+0x1b/0x70 [ 147.762046][ T3609] ? selinux_file_permission+0x2a5/0x510 [ 147.767691][ T3609] proc_fail_nth_write+0x85/0x1f0 [ 147.772722][ T3609] ? proc_fail_nth_read+0x210/0x210 [ 147.777927][ T3609] ? rw_verify_area+0x1c0/0x360 [ 147.782780][ T3609] ? proc_fail_nth_read+0x210/0x210 [ 147.787975][ T3609] vfs_write+0x32d/0xd60 [ 147.792276][ T3609] ? kernel_write+0x3c0/0x3c0 [ 147.796954][ T3609] ? __kasan_check_write+0x14/0x20 [ 147.802064][ T3609] ? mutex_lock+0x8c/0xe0 [ 147.806400][ T3609] ? mutex_trylock+0xa0/0xa0 [ 147.810995][ T3609] ? __fget_files+0x2c4/0x320 [ 147.815694][ T3609] ? __fdget_pos+0x2d2/0x380 [ 147.820279][ T3609] ? ksys_write+0x71/0x240 [ 147.824692][ T3609] ksys_write+0x140/0x240 [ 147.829022][ T3609] ? __ia32_sys_read+0x90/0x90 [ 147.833793][ T3609] ? fpu__clear_all+0x20/0x20 [ 147.838479][ T3609] __x64_sys_write+0x7b/0x90 [ 147.843070][ T3609] do_syscall_64+0x31/0x40 [ 147.847487][ T3609] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 147.853392][ T3609] RIP: 0033:0x7f71c50d83df [ 147.857822][ T3609] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 147.877431][ T3609] RSP: 002b:00007f71c3742030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 147.885846][ T3609] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f71c50d83df [ 147.893826][ T3609] RDX: 0000000000000001 RSI: 00007f71c37420a0 RDI: 0000000000000009 [ 147.901799][ T3609] RBP: 00007f71c3742090 R08: 0000000000000000 R09: 0000000000000000 [ 147.909773][ T3609] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 147.917745][ T3609] R13: 0000000000000000 R14: 00007f71c5300fa0 R15: 00007ffee1c4e1f8 [ 148.037443][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 148.045772][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 148.053501][ T9] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 148.285060][ T3636] device syzkaller0 entered promiscuous mode [ 148.356117][ T3642] device syzkaller0 entered promiscuous mode [ 148.858698][ T3673] device syzkaller0 entered promiscuous mode [ 149.784234][ T3688] device syzkaller0 entered promiscuous mode [ 151.066720][ T3728] device veth0_vlan left promiscuous mode [ 151.138206][ T3728] device veth0_vlan entered promiscuous mode [ 151.238623][ T3738] device syzkaller0 entered promiscuous mode [ 151.282818][ T3740] syz.1.1261[3740] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.282869][ T3740] syz.1.1261[3740] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.338693][ T3727] device wg2 left promiscuous mode [ 151.589197][ T3754] device sit0 left promiscuous mode [ 151.813493][ T3765] syz.0.1270[3765] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.817566][ T3765] syz.0.1270[3765] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 151.943888][ T3774] syz.1.1273[3774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.120289][ T3774] syz.1.1273[3774] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 152.250275][ T3767] device syzkaller0 entered promiscuous mode [ 152.549509][ T3781] device syzkaller0 entered promiscuous mode [ 152.776788][ T3803] device veth0_vlan left promiscuous mode [ 152.803162][ T3803] device veth0_vlan entered promiscuous mode [ 153.087757][ T3818] €Â0: renamed from pim6reg1 [ 153.256380][ T3829] syz.3.1293[3829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 153.256449][ T3829] syz.3.1293[3829] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 154.195460][ T3860] device pim6reg1 entered promiscuous mode [ 154.858799][ T3892] €Â0: renamed from pim6reg1 [ 155.277492][ T3923] syz.3.1327[3923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.277546][ T3923] syz.3.1327[3923] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.765570][ T3933] device syzkaller0 entered promiscuous mode [ 155.820399][ T3932] €Â0: renamed from pim6reg1 [ 156.109204][ T3940] device syzkaller0 entered promiscuous mode [ 156.326922][ T3950] device sit0 entered promiscuous mode [ 157.255138][ T24] audit: type=1400 audit(1750134102.070:139): avc: denied { create } for pid=3976 comm="syz.2.1346" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 157.345471][ T3977] device sit0 left promiscuous mode [ 157.689376][ T3988] device syzkaller0 entered promiscuous mode [ 158.550807][ T4012] device syzkaller0 entered promiscuous mode [ 159.201295][ T4032] device syzkaller0 entered promiscuous mode [ 159.338514][ T4040] FAULT_INJECTION: forcing a failure. [ 159.338514][ T4040] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 159.352891][ T4040] CPU: 0 PID: 4040 Comm: syz.3.1369 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 159.364189][ T4040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 159.374233][ T4040] Call Trace: [ 159.377519][ T4040] __dump_stack+0x21/0x24 [ 159.381839][ T4040] dump_stack_lvl+0x169/0x1d8 [ 159.386506][ T4040] ? show_regs_print_info+0x18/0x18 [ 159.391694][ T4040] ? memset+0x35/0x40 [ 159.395669][ T4040] dump_stack+0x15/0x1c [ 159.399817][ T4040] should_fail+0x3c1/0x510 [ 159.404224][ T4040] should_fail_usercopy+0x1a/0x20 [ 159.409237][ T4040] strncpy_from_user+0x24/0x2e0 [ 159.414084][ T4040] ? __kasan_check_write+0x14/0x20 [ 159.419182][ T4040] bpf_raw_tracepoint_open+0x346/0x790 [ 159.424631][ T4040] ? bpf_obj_get_info_by_fd+0x2c30/0x2c30 [ 159.430359][ T4040] ? selinux_bpf+0xce/0xf0 [ 159.434762][ T4040] ? security_bpf+0x82/0xa0 [ 159.439252][ T4040] __se_sys_bpf+0x418/0x680 [ 159.443744][ T4040] ? __x64_sys_bpf+0x90/0x90 [ 159.448332][ T4040] ? fpu__clear_all+0x20/0x20 [ 159.452999][ T4040] __x64_sys_bpf+0x7b/0x90 [ 159.457402][ T4040] do_syscall_64+0x31/0x40 [ 159.461807][ T4040] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 159.467685][ T4040] RIP: 0033:0x7f3efd81c929 [ 159.472088][ T4040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 159.491677][ T4040] RSP: 002b:00007f3efbe85038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 159.500083][ T4040] RAX: ffffffffffffffda RBX: 00007f3efda43fa0 RCX: 00007f3efd81c929 [ 159.508055][ T4040] RDX: 0000000000000010 RSI: 0000200000000140 RDI: 0000000000000011 [ 159.516017][ T4040] RBP: 00007f3efbe85090 R08: 0000000000000000 R09: 0000000000000000 [ 159.523978][ T4040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 159.531941][ T4040] R13: 0000000000000000 R14: 00007f3efda43fa0 R15: 00007ffeef890028 [ 159.636560][ T4043] syz.0.1370[4043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.636704][ T4043] syz.0.1370[4043] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.659255][ T4041] device syzkaller0 entered promiscuous mode [ 159.695154][ T4045] device wg2 entered promiscuous mode [ 160.138210][ T4057] ip6erspan0: tun_chr_ioctl cmd 1074025677 [ 160.196759][ T4057] ip6erspan0: linktype set to 805 [ 160.508839][ T4063] ref_ctr_offset mismatch. inode: 0x627 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x1fe [ 160.625438][ T4065] device syzkaller0 entered promiscuous mode [ 161.137976][ T4070] device wg2 left promiscuous mode [ 161.289287][ T4077] FAULT_INJECTION: forcing a failure. [ 161.289287][ T4077] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 161.306577][ T4077] CPU: 1 PID: 4077 Comm: syz.0.1383 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 161.317870][ T4077] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 161.327931][ T4077] Call Trace: [ 161.331237][ T4077] __dump_stack+0x21/0x24 [ 161.335585][ T4077] dump_stack_lvl+0x169/0x1d8 [ 161.340275][ T4077] ? show_regs_print_info+0x18/0x18 [ 161.345485][ T4077] dump_stack+0x15/0x1c [ 161.349646][ T4077] should_fail+0x3c1/0x510 [ 161.354073][ T4077] should_fail_alloc_page+0x4f/0x60 [ 161.359282][ T4077] __alloc_pages_nodemask+0x109/0x5f0 [ 161.364668][ T4077] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 161.370220][ T4077] ? __kmalloc+0x1a7/0x330 [ 161.374634][ T4077] ? __vmalloc_node_range+0x29f/0x780 [ 161.380005][ T4077] __vmalloc_node_range+0x353/0x780 [ 161.385209][ T4077] dup_task_struct+0x40f/0xbd0 [ 161.389993][ T4077] ? copy_process+0x5b2/0x32c0 [ 161.394760][ T4077] ? __kasan_check_write+0x14/0x20 [ 161.399874][ T4077] ? recalc_sigpending+0x1ac/0x230 [ 161.404986][ T4077] copy_process+0x5b2/0x32c0 [ 161.409583][ T4077] ? timerqueue_add+0x20a/0x230 [ 161.414438][ T4077] ? __pidfd_prepare+0x150/0x150 [ 161.419389][ T4077] ? __hrtimer_run_queues+0x903/0x960 [ 161.424763][ T4077] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 161.430603][ T4077] kernel_clone+0x23f/0x940 [ 161.435106][ T4077] ? clockevents_program_event+0x362/0x8b0 [ 161.440908][ T4077] ? create_io_thread+0x130/0x130 [ 161.445931][ T4077] __x64_sys_clone+0x176/0x1d0 [ 161.450693][ T4077] ? __ia32_sys_vfork+0xf0/0xf0 [ 161.455538][ T4077] ? sched_clock+0x3a/0x40 [ 161.459956][ T4077] ? debug_smp_processor_id+0x17/0x20 [ 161.465324][ T4077] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 161.471498][ T4077] ? irqentry_exit_to_user_mode+0x41/0x80 [ 161.477258][ T4077] do_syscall_64+0x31/0x40 [ 161.481700][ T4077] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 161.487619][ T4077] RIP: 0033:0x7fdff3f3c929 [ 161.492048][ T4077] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 161.511662][ T4077] RSP: 002b:00007fdff25a4fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 161.520083][ T4077] RAX: ffffffffffffffda RBX: 00007fdff4163fa0 RCX: 00007fdff3f3c929 [ 161.528064][ T4077] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 161.536042][ T4077] RBP: 00007fdff25a5090 R08: 0000000000000000 R09: 0000000000000000 [ 161.544014][ T4077] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 161.552002][ T4077] R13: 0000000000000000 R14: 00007fdff4163fa0 R15: 00007ffc41031a78 [ 161.592142][ T4081] device syzkaller0 entered promiscuous mode [ 161.802140][ T4099] device syzkaller0 entered promiscuous mode [ 161.933678][ T4104] device syzkaller0 entered promiscuous mode [ 162.042973][ T4113] FAULT_INJECTION: forcing a failure. [ 162.042973][ T4113] name failslab, interval 1, probability 0, space 0, times 0 [ 162.060652][ T4113] CPU: 1 PID: 4113 Comm: syz.1.1398 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 162.071955][ T4113] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 162.082018][ T4113] Call Trace: [ 162.085320][ T4113] __dump_stack+0x21/0x24 [ 162.089669][ T4113] dump_stack_lvl+0x169/0x1d8 [ 162.094360][ T4113] ? show_regs_print_info+0x18/0x18 [ 162.099565][ T4113] dump_stack+0x15/0x1c [ 162.103722][ T4113] should_fail+0x3c1/0x510 [ 162.108159][ T4113] ? tipc_group_create+0xa1/0x650 [ 162.113192][ T4113] __should_failslab+0xa4/0xe0 [ 162.117962][ T4113] should_failslab+0x9/0x20 [ 162.122472][ T4113] kmem_cache_alloc_trace+0x3a/0x2e0 [ 162.127758][ T4113] tipc_group_create+0xa1/0x650 [ 162.132624][ T4113] tipc_sk_join+0x15b/0x830 [ 162.137115][ T4113] ? __kasan_check_write+0x14/0x20 [ 162.142211][ T4113] ? _copy_from_user+0x95/0xd0 [ 162.146954][ T4113] tipc_setsockopt+0x684/0x900 [ 162.151702][ T4113] ? tipc_shutdown+0x960/0x960 [ 162.156450][ T4113] ? security_socket_setsockopt+0x82/0xa0 [ 162.162149][ T4113] ? tipc_shutdown+0x960/0x960 [ 162.166892][ T4113] __sys_setsockopt+0x2ed/0x460 [ 162.171729][ T4113] ? __ia32_sys_recv+0xb0/0xb0 [ 162.176475][ T4113] ? ksys_write+0x1eb/0x240 [ 162.180974][ T4113] __x64_sys_setsockopt+0xbf/0xd0 [ 162.185997][ T4113] do_syscall_64+0x31/0x40 [ 162.190418][ T4113] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 162.196302][ T4113] RIP: 0033:0x7fb6adc65929 [ 162.200703][ T4113] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 162.220293][ T4113] RSP: 002b:00007fb6ac2ce038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 162.228694][ T4113] RAX: ffffffffffffffda RBX: 00007fb6ade8cfa0 RCX: 00007fb6adc65929 [ 162.236661][ T4113] RDX: 0000000000000087 RSI: 000000000000010f RDI: 000000000000000a [ 162.244622][ T4113] RBP: 00007fb6ac2ce090 R08: 00000000000004bd R09: 0000000000000000 [ 162.252577][ T4113] R10: 0000200000000180 R11: 0000000000000246 R12: 0000000000000001 [ 162.260537][ T4113] R13: 0000000000000000 R14: 00007fb6ade8cfa0 R15: 00007ffdc1b7b888 [ 162.585570][ T4124] FAULT_INJECTION: forcing a failure. [ 162.585570][ T4124] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 162.854072][ T4124] CPU: 1 PID: 4124 Comm: syz.3.1401 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 162.865397][ T4124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 162.875465][ T4124] Call Trace: [ 162.878764][ T4124] __dump_stack+0x21/0x24 [ 162.883099][ T4124] dump_stack_lvl+0x169/0x1d8 [ 162.887777][ T4124] ? show_regs_print_info+0x18/0x18 [ 162.892984][ T4124] dump_stack+0x15/0x1c [ 162.897144][ T4124] should_fail+0x3c1/0x510 [ 162.901563][ T4124] should_fail_alloc_page+0x4f/0x60 [ 162.906757][ T4124] __alloc_pages_nodemask+0x109/0x5f0 [ 162.912126][ T4124] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 162.917682][ T4124] shmem_alloc_page+0x1b1/0x300 [ 162.922534][ T4124] ? put_page+0xd0/0xd0 [ 162.926701][ T4124] ? percpu_counter_add_batch+0x13c/0x160 [ 162.932429][ T4124] shmem_alloc_and_acct_page+0x36f/0x7b0 [ 162.938066][ T4124] ? shmem_swapin_page+0x16c0/0x16c0 [ 162.943346][ T4124] ? xas_load+0x28b/0x2a0 [ 162.947675][ T4124] ? find_get_entry+0x366/0x3c0 [ 162.952524][ T4124] ? page_cache_prev_miss+0x270/0x270 [ 162.957898][ T4124] ? rotate_reclaimable_page+0x4a0/0x4a0 [ 162.963532][ T4124] ? kvm_sched_clock_read+0x18/0x40 [ 162.968733][ T4124] ? sched_clock+0x3a/0x40 [ 162.973148][ T4124] ? sched_clock_cpu+0x1b/0x3d0 [ 162.978004][ T4124] ? find_lock_entry+0x4b/0x200 [ 162.982859][ T4124] shmem_getpage_gfp+0x625/0x2110 [ 162.987910][ T4124] shmem_fallocate+0x817/0xc20 [ 162.992678][ T4124] ? avc_ss_reset+0x280/0x280 [ 162.997363][ T4124] ? shmem_mmap+0x270/0x270 [ 163.001869][ T4124] ? avc_policy_seqno+0x1b/0x70 [ 163.006721][ T4124] ? selinux_file_permission+0x2a5/0x510 [ 163.012368][ T4124] ? fsnotify_perm+0x66/0x4b0 [ 163.017043][ T4124] ? preempt_count_add+0x90/0x1b0 [ 163.022065][ T4124] vfs_fallocate+0x4b4/0x590 [ 163.026653][ T4124] do_vfs_ioctl+0x12e3/0x1510 [ 163.031335][ T4124] ? __ia32_compat_sys_ioctl+0x7b0/0x7b0 [ 163.036966][ T4124] ? has_cap_mac_admin+0x330/0x330 [ 163.042084][ T4124] ? selinux_file_ioctl+0x377/0x480 [ 163.047288][ T4124] ? mutex_trylock+0xa0/0xa0 [ 163.051891][ T4124] ? __fget_files+0x2c4/0x320 [ 163.056567][ T4124] ? selinux_file_alloc_security+0x120/0x120 [ 163.062543][ T4124] ? __fget_files+0x2c4/0x320 [ 163.067227][ T4124] ? security_file_ioctl+0x84/0xa0 [ 163.072348][ T4124] __se_sys_ioctl+0x9f/0x1a0 [ 163.076947][ T4124] __x64_sys_ioctl+0x7b/0x90 [ 163.081545][ T4124] do_syscall_64+0x31/0x40 [ 163.085965][ T4124] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 163.091857][ T4124] RIP: 0033:0x7f3efd81c929 [ 163.096276][ T4124] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 163.115890][ T4124] RSP: 002b:00007f3efbe85038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 163.124315][ T4124] RAX: ffffffffffffffda RBX: 00007f3efda43fa0 RCX: 00007f3efd81c929 [ 163.132299][ T4124] RDX: 0000200000000040 RSI: 000000004030582a RDI: 000000000000000c [ 163.140273][ T4124] RBP: 00007f3efbe85090 R08: 0000000000000000 R09: 0000000000000000 [ 163.148256][ T4124] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 163.156238][ T4124] R13: 0000000000000000 R14: 00007f3efda43fa0 R15: 00007ffeef890028 [ 163.950269][ T4148] device syzkaller0 entered promiscuous mode [ 164.166890][ T4150] device syzkaller0 entered promiscuous mode [ 164.214111][ T4159] syz.0.1412[4159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 164.222454][ T4159] syz.0.1412[4159] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 165.302328][ T24] audit: type=1400 audit(1750134110.120:140): avc: denied { create } for pid=4193 comm="syz.0.1426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 165.348174][ T4191] device syzkaller0 entered promiscuous mode [ 166.409272][ T4208] device syzkaller0 entered promiscuous mode [ 166.915094][ T4230] device syzkaller0 entered promiscuous mode [ 166.947008][ T4232] syz.0.1437[4232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.947089][ T4232] syz.0.1437[4232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.995145][ T4234] syz.4.1439[4234] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.106196][ T4234] syz.4.1439[4234] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.129698][ T4243] syz.2.1441[4243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 167.210766][ T4243] syz.2.1441[4243] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 168.902647][ T4283] FAULT_INJECTION: forcing a failure. [ 168.902647][ T4283] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 168.927181][ T4283] CPU: 0 PID: 4283 Comm: syz.4.1454 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 168.938474][ T4283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 168.948538][ T4283] Call Trace: [ 168.951861][ T4283] __dump_stack+0x21/0x24 [ 168.956206][ T4283] dump_stack_lvl+0x169/0x1d8 [ 168.960899][ T4283] ? thaw_kernel_threads+0x220/0x220 [ 168.966192][ T4283] ? show_regs_print_info+0x18/0x18 [ 168.971410][ T4283] dump_stack+0x15/0x1c [ 168.975578][ T4283] should_fail+0x3c1/0x510 [ 168.980007][ T4283] should_fail_usercopy+0x1a/0x20 [ 168.985044][ T4283] iov_iter_copy_from_user_atomic+0x32e/0xb00 [ 168.991127][ T4283] generic_perform_write+0x326/0x510 [ 168.996425][ T4283] ? atime_needs_update+0x5b0/0x5b0 [ 169.001638][ T4283] ? grab_cache_page_write_begin+0xb0/0xb0 [ 169.007473][ T4283] ? file_remove_privs+0x580/0x580 [ 169.012597][ T4283] ? __fsnotify_parent+0x5f5/0x6c0 [ 169.017726][ T4283] ? __kasan_check_write+0x14/0x20 [ 169.022849][ T4283] ? down_write+0xac/0x110 [ 169.027281][ T4283] __generic_file_write_iter+0x24b/0x480 [ 169.032987][ T4283] ? generic_write_checks+0x3d4/0x480 [ 169.038376][ T4283] generic_file_write_iter+0xa9/0x1d0 [ 169.043759][ T4283] vfs_write+0x725/0xd60 [ 169.048019][ T4283] ? __kasan_slab_free+0x11/0x20 [ 169.052968][ T4283] ? kernel_write+0x3c0/0x3c0 [ 169.057662][ T4283] ? mutex_trylock+0xa0/0xa0 [ 169.062260][ T4283] ? __fget_files+0x2c4/0x320 [ 169.066945][ T4283] ? __fdget_pos+0x2d2/0x380 [ 169.071540][ T4283] ? ksys_write+0x71/0x240 [ 169.075967][ T4283] ksys_write+0x140/0x240 [ 169.080307][ T4283] ? __ia32_sys_read+0x90/0x90 [ 169.085087][ T4283] ? fpu__clear_all+0x20/0x20 [ 169.089776][ T4283] __x64_sys_write+0x7b/0x90 [ 169.094382][ T4283] do_syscall_64+0x31/0x40 [ 169.098822][ T4283] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 169.104720][ T4283] RIP: 0033:0x7fbca2c9d929 [ 169.109150][ T4283] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 169.128861][ T4283] RSP: 002b:00007fbca1306038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 169.137293][ T4283] RAX: ffffffffffffffda RBX: 00007fbca2ec4fa0 RCX: 00007fbca2c9d929 [ 169.145272][ T4283] RDX: 0000000000043451 RSI: 0000200000000200 RDI: 0000000000000006 [ 169.153242][ T4283] RBP: 00007fbca1306090 R08: 0000000000000000 R09: 0000000000000000 [ 169.161206][ T4283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 169.169173][ T4283] R13: 0000000000000000 R14: 00007fbca2ec4fa0 R15: 00007ffe080e8aa8 [ 172.371096][ T4355] device pim6reg1 entered promiscuous mode [ 173.455564][ T4364] device syzkaller0 entered promiscuous mode [ 173.619017][ T4382] €Â0: renamed from pim6reg1 [ 175.306442][ T4414] device wg2 entered promiscuous mode [ 176.564435][ T4461] FAULT_INJECTION: forcing a failure. [ 176.564435][ T4461] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 176.687918][ T4461] CPU: 1 PID: 4461 Comm: syz.1.1515 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 176.699249][ T4461] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 176.709325][ T4461] Call Trace: [ 176.712635][ T4461] __dump_stack+0x21/0x24 [ 176.716984][ T4461] dump_stack_lvl+0x169/0x1d8 [ 176.721684][ T4461] ? show_regs_print_info+0x18/0x18 [ 176.724675][ T4468] device syzkaller0 entered promiscuous mode [ 176.726892][ T4461] dump_stack+0x15/0x1c [ 176.726906][ T4461] should_fail+0x3c1/0x510 [ 176.726925][ T4461] should_fail_usercopy+0x1a/0x20 [ 176.746497][ T4461] strncpy_from_user+0x24/0x2e0 [ 176.751372][ T4461] bpf_prog_load+0x15d/0x1420 [ 176.756058][ T4461] ? avc_has_perm+0x234/0x360 [ 176.760738][ T4461] ? avc_has_perm_noaudit+0x240/0x240 [ 176.766101][ T4461] ? map_freeze+0x320/0x320 [ 176.770604][ T4461] ? ktime_get+0x10e/0x140 [ 176.775013][ T4461] ? selinux_bpf+0xc7/0xf0 [ 176.779434][ T4461] ? security_bpf+0x82/0xa0 [ 176.783933][ T4461] __se_sys_bpf+0x442/0x680 [ 176.788516][ T4461] ? __x64_sys_bpf+0x90/0x90 [ 176.793101][ T4461] ? debug_smp_processor_id+0x17/0x20 [ 176.798473][ T4461] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 176.804532][ T4461] __x64_sys_bpf+0x7b/0x90 [ 176.808941][ T4461] do_syscall_64+0x31/0x40 [ 176.813357][ T4461] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 176.819241][ T4461] RIP: 0033:0x7fb6adc65929 [ 176.823651][ T4461] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 176.843273][ T4461] RSP: 002b:00007fb6ac2ce038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 176.851682][ T4461] RAX: ffffffffffffffda RBX: 00007fb6ade8cfa0 RCX: 00007fb6adc65929 [ 176.859647][ T4461] RDX: 0000000000000048 RSI: 00002000000017c0 RDI: 0000000000000005 [ 176.867613][ T4461] RBP: 00007fb6ac2ce090 R08: 0000000000000000 R09: 0000000000000000 [ 176.875607][ T4461] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 176.883572][ T4461] R13: 0000000000000000 R14: 00007fb6ade8cfa0 R15: 00007ffdc1b7b888 [ 177.047835][ T4475] €Â0: renamed from pim6reg1 [ 177.284176][ T24] audit: type=1400 audit(1750134122.100:141): avc: denied { create } for pid=4478 comm="syz.0.1523" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 177.427937][ T4486] device sit0 entered promiscuous mode [ 177.452191][ T24] audit: type=1400 audit(1750134122.270:142): avc: denied { create } for pid=4480 comm="syz.3.1524" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 177.894850][ T4506] €Â0: renamed from pim6reg1 [ 178.733864][ T4524] device syzkaller0 entered promiscuous mode [ 178.740643][ T4522] FAULT_INJECTION: forcing a failure. [ 178.740643][ T4522] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 178.741674][ T4525] syz.1.1537[4525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.764222][ T4525] syz.1.1537[4525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.776195][ T4522] CPU: 1 PID: 4522 Comm: syz.4.1538 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 178.798774][ T4522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 178.808841][ T4522] Call Trace: [ 178.812153][ T4522] __dump_stack+0x21/0x24 [ 178.816495][ T4522] dump_stack_lvl+0x169/0x1d8 [ 178.821184][ T4522] ? show_regs_print_info+0x18/0x18 [ 178.826375][ T4522] dump_stack+0x15/0x1c [ 178.830518][ T4522] should_fail+0x3c1/0x510 [ 178.834932][ T4522] should_fail_alloc_page+0x4f/0x60 [ 178.840128][ T4522] __alloc_pages_nodemask+0x109/0x5f0 [ 178.845490][ T4522] ? gfp_pfmemalloc_allowed+0x130/0x130 [ 178.851028][ T4522] ? __kmalloc+0x1a7/0x330 [ 178.855439][ T4522] ? __vmalloc_node_range+0x29f/0x780 [ 178.860800][ T4522] __vmalloc_node_range+0x353/0x780 [ 178.865987][ T4522] bpf_map_area_alloc+0xd5/0xe0 [ 178.870825][ T4522] ? prealloc_init+0x147/0x810 [ 178.875586][ T4522] prealloc_init+0x147/0x810 [ 178.880179][ T4522] ? __kmalloc+0x1a7/0x330 [ 178.884585][ T4522] htab_map_alloc+0x688/0x970 [ 178.889253][ T4522] map_create+0x441/0x2190 [ 178.893660][ T4522] __se_sys_bpf+0x203/0x680 [ 178.898171][ T4522] ? __x64_sys_bpf+0x90/0x90 [ 178.902755][ T4522] ? fpu__clear_all+0x20/0x20 [ 178.907424][ T4522] __x64_sys_bpf+0x7b/0x90 [ 178.911829][ T4522] do_syscall_64+0x31/0x40 [ 178.916240][ T4522] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 178.922125][ T4522] RIP: 0033:0x7fbca2c9d929 [ 178.926533][ T4522] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 178.946133][ T4522] RSP: 002b:00007fbca1306038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 178.954543][ T4522] RAX: ffffffffffffffda RBX: 00007fbca2ec4fa0 RCX: 00007fbca2c9d929 [ 178.962505][ T4522] RDX: 0000000000000050 RSI: 0000200000000840 RDI: 0000000000000000 [ 178.970467][ T4522] RBP: 00007fbca1306090 R08: 0000000000000000 R09: 0000000000000000 [ 178.978429][ T4522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 178.986416][ T4522] R13: 0000000000000000 R14: 00007fbca2ec4fa0 R15: 00007ffe080e8aa8 [ 179.313824][ T4542] €Â0: renamed from pim6reg1 [ 180.118113][ T4562] device syzkaller0 entered promiscuous mode [ 180.330555][ T4575] €Â0: renamed from pim6reg1 [ 180.648014][ T4585] device veth1_macvtap left promiscuous mode [ 180.747000][ T4585] device macsec0 entered promiscuous mode [ 180.847940][ T4587] device veth1_macvtap entered promiscuous mode [ 182.983738][ T4655] device veth0_vlan left promiscuous mode [ 183.035834][ T4655] device veth0_vlan entered promiscuous mode [ 183.120749][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 183.130309][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 183.147092][ T112] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 184.012498][ T4689] device veth1_macvtap left promiscuous mode [ 184.427955][ T4706] device syzkaller0 entered promiscuous mode [ 185.884030][ T4742] device syzkaller0 entered promiscuous mode [ 186.796744][ T4768] €Â0: renamed from pim6reg1 [ 186.857329][ T4770] syzkaller0: refused to change device tx_queue_len [ 187.112537][ T4785] device syzkaller0 entered promiscuous mode [ 187.809986][ T4794] device syzkaller0 entered promiscuous mode [ 188.077468][ T4797] device syzkaller0 entered promiscuous mode [ 188.897420][ T4815] syz.2.1635 uses obsolete (PF_INET,SOCK_PACKET) [ 188.935155][ T4824] device syzkaller0 entered promiscuous mode [ 189.335833][ T4835] device syzkaller0 entered promiscuous mode [ 190.593701][ T4875] device syzkaller0 entered promiscuous mode [ 191.055146][ T4879] device syzkaller0 entered promiscuous mode [ 191.401674][ T4887] device pim6reg1 entered promiscuous mode [ 192.313392][ T4906] device syzkaller0 entered promiscuous mode [ 193.105061][ T4934] €Â0: renamed from pim6reg1 [ 193.246763][ T4938] syz.2.1678[4938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.246840][ T4938] syz.2.1678[4938] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 193.585501][ T4948] device syzkaller0 entered promiscuous mode [ 193.784458][ T4953] device syzkaller0 entered promiscuous mode [ 194.169988][ T24] audit: type=1400 audit(1750134138.990:143): avc: denied { tracepoint } for pid=4954 comm="syz.3.1681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 194.482240][ T4955] ÿÿÿÿÿÿ: renamed from vlan1 [ 194.650608][ T4975] €Â0: renamed from pim6reg1 [ 195.605291][ T4996] device syzkaller0 entered promiscuous mode [ 195.941505][ T5014] syz.3.1701[5014] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 195.941563][ T5014] syz.3.1701[5014] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 196.401431][ T5023] €Â0: renamed from pim6reg1 [ 196.756288][ T5032] device syzkaller0 entered promiscuous mode [ 196.846840][ T5046] device syzkaller0 entered promiscuous mode [ 197.021169][ T5049] device syzkaller0 entered promiscuous mode [ 197.349694][ T5066] €Â0: renamed from pim6reg1 [ 197.780402][ T5084] device syzkaller0 entered promiscuous mode [ 197.840303][ T5087] device syzkaller0 entered promiscuous mode [ 198.292357][ T5103] device wg2 entered promiscuous mode [ 198.360331][ T5110] €Â0: renamed from pim6reg1 [ 198.571158][ T5115] FAULT_INJECTION: forcing a failure. [ 198.571158][ T5115] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 198.647525][ T5115] CPU: 0 PID: 5115 Comm: syz.1.1735 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 198.658855][ T5115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 198.668924][ T5115] Call Trace: [ 198.672235][ T5115] __dump_stack+0x21/0x24 [ 198.676584][ T5115] dump_stack_lvl+0x169/0x1d8 [ 198.681277][ T5115] ? show_regs_print_info+0x18/0x18 [ 198.686488][ T5115] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 198.692316][ T5115] dump_stack+0x15/0x1c [ 198.696495][ T5115] should_fail+0x3c1/0x510 [ 198.700927][ T5115] should_fail_usercopy+0x1a/0x20 [ 198.705966][ T5115] _copy_from_user+0x20/0xd0 [ 198.710572][ T5115] generic_map_update_batch+0x450/0x740 [ 198.716136][ T5115] ? bpf_enable_instrumentation+0x50/0x50 [ 198.721876][ T5115] ? __fdget+0x1a1/0x230 [ 198.726140][ T5115] ? bpf_enable_instrumentation+0x50/0x50 [ 198.731877][ T5115] bpf_map_do_batch+0x463/0x5f0 [ 198.736749][ T5115] __se_sys_bpf+0x55a/0x680 [ 198.741262][ T5115] ? __x64_sys_bpf+0x90/0x90 [ 198.745868][ T5115] ? fpu__clear_all+0x20/0x20 [ 198.750552][ T5115] __x64_sys_bpf+0x7b/0x90 [ 198.754963][ T5115] do_syscall_64+0x31/0x40 [ 198.759382][ T5115] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 198.765270][ T5115] RIP: 0033:0x7fb6adc65929 [ 198.769701][ T5115] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 198.789403][ T5115] RSP: 002b:00007fb6ac2ce038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 198.797811][ T5115] RAX: ffffffffffffffda RBX: 00007fb6ade8cfa0 RCX: 00007fb6adc65929 [ 198.805789][ T5115] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 198.813753][ T5115] RBP: 00007fb6ac2ce090 R08: 0000000000000000 R09: 0000000000000000 [ 198.821715][ T5115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 198.829682][ T5115] R13: 0000000000000000 R14: 00007fb6ade8cfa0 R15: 00007ffdc1b7b888 [ 199.076430][ T5132] syz.3.1740[5132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.076513][ T5132] syz.3.1740[5132] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.135225][ T5137] device syzkaller0 entered promiscuous mode [ 199.241131][ T5144] €Â0: renamed from pim6reg1 [ 199.911342][ T5150] device syzkaller0 entered promiscuous mode [ 199.939584][ T5162] FAULT_INJECTION: forcing a failure. [ 199.939584][ T5162] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 200.038689][ T5162] CPU: 0 PID: 5162 Comm: syz.4.1751 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 200.050021][ T5162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 200.060086][ T5162] Call Trace: [ 200.063406][ T5162] __dump_stack+0x21/0x24 [ 200.067754][ T5162] dump_stack_lvl+0x169/0x1d8 [ 200.072459][ T5162] ? show_regs_print_info+0x18/0x18 [ 200.077661][ T5162] ? vfs_write+0xac8/0xd60 [ 200.082083][ T5162] dump_stack+0x15/0x1c [ 200.086262][ T5162] should_fail+0x3c1/0x510 [ 200.090693][ T5162] should_fail_usercopy+0x1a/0x20 [ 200.095728][ T5162] _copy_from_user+0x20/0xd0 [ 200.100333][ T5162] __se_sys_bpf+0x181/0x680 [ 200.104853][ T5162] ? __x64_sys_bpf+0x90/0x90 [ 200.109458][ T5162] ? fpu__clear_all+0x20/0x20 [ 200.114149][ T5162] __x64_sys_bpf+0x7b/0x90 [ 200.118572][ T5162] do_syscall_64+0x31/0x40 [ 200.123004][ T5162] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 200.128896][ T5162] RIP: 0033:0x7fbca2c9d929 [ 200.133323][ T5162] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 200.152937][ T5162] RSP: 002b:00007fbca1306038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 200.161371][ T5162] RAX: ffffffffffffffda RBX: 00007fbca2ec4fa0 RCX: 00007fbca2c9d929 [ 200.169377][ T5162] RDX: 0000000000000010 RSI: 00002000000001c0 RDI: 0000000000000011 [ 200.177365][ T5162] RBP: 00007fbca1306090 R08: 0000000000000000 R09: 0000000000000000 [ 200.185346][ T5162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 200.193343][ T5162] R13: 0000000000000000 R14: 00007fbca2ec4fa0 R15: 00007ffe080e8aa8 [ 200.691427][ T5172] device syzkaller0 entered promiscuous mode [ 200.723425][ T5184] €Â0: renamed from pim6reg1 [ 200.856428][ T5192] FAULT_INJECTION: forcing a failure. [ 200.856428][ T5192] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 200.946706][ T5192] CPU: 1 PID: 5192 Comm: syz.2.1763 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 200.958035][ T5192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 200.968106][ T5192] Call Trace: [ 200.971415][ T5192] __dump_stack+0x21/0x24 [ 200.975752][ T5192] dump_stack_lvl+0x169/0x1d8 [ 200.980441][ T5192] ? show_regs_print_info+0x18/0x18 [ 200.985648][ T5192] ? ___ratelimit+0xc/0x560 [ 200.990162][ T5192] dump_stack+0x15/0x1c [ 200.994323][ T5192] should_fail+0x3c1/0x510 [ 200.998746][ T5192] should_fail_usercopy+0x1a/0x20 [ 201.003865][ T5192] _copy_from_user+0x20/0xd0 [ 201.008549][ T5192] __se_sys_bpf+0x181/0x680 [ 201.013060][ T5192] ? __x64_sys_bpf+0x90/0x90 [ 201.017662][ T5192] ? debug_smp_processor_id+0x17/0x20 [ 201.023041][ T5192] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 201.029122][ T5192] __x64_sys_bpf+0x7b/0x90 [ 201.033550][ T5192] do_syscall_64+0x31/0x40 [ 201.037982][ T5192] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 201.043881][ T5192] RIP: 0033:0x7f71c50d9929 [ 201.048304][ T5192] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 201.067923][ T5192] RSP: 002b:00007f71c3742038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 201.076361][ T5192] RAX: ffffffffffffffda RBX: 00007f71c5300fa0 RCX: 00007f71c50d9929 [ 201.084338][ T5192] RDX: 0000000000000048 RSI: 00002000000054c0 RDI: 0000000000000005 [ 201.092322][ T5192] RBP: 00007f71c3742090 R08: 0000000000000000 R09: 0000000000000000 [ 201.100302][ T5192] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 201.108285][ T5192] R13: 0000000000000000 R14: 00007f71c5300fa0 R15: 00007ffee1c4e1f8 [ 201.780823][ T5218] €Â0: renamed from pim6reg1 [ 202.100530][ T5221] device syzkaller0 entered promiscuous mode [ 202.120524][ T5224] device sit0 left promiscuous mode [ 202.329432][ T5227] device sit0 entered promiscuous mode [ 202.749433][ T5258] €Â0: renamed from pim6reg1 [ 203.342051][ T5269] device syzkaller0 entered promiscuous mode [ 203.410231][ T5276] device syzkaller0 entered promiscuous mode [ 203.478147][ T24] audit: type=1400 audit(1750134148.290:144): avc: denied { create } for pid=5279 comm="syz.0.1797" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 203.803601][ T5289] €Â0: renamed from pim6reg1 [ 204.677990][ T5313] device syzkaller0 entered promiscuous mode [ 204.824775][ T5319] device sit0 entered promiscuous mode [ 205.130639][ T5325] €Â0: renamed from pim6reg1 [ 205.929578][ T5354] device syzkaller0 entered promiscuous mode [ 206.201173][ T5360] FAULT_INJECTION: forcing a failure. [ 206.201173][ T5360] name failslab, interval 1, probability 0, space 0, times 0 [ 206.213884][ T5360] CPU: 0 PID: 5360 Comm: syz.4.1826 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 206.225160][ T5360] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 206.235207][ T5360] Call Trace: [ 206.238512][ T5360] __dump_stack+0x21/0x24 [ 206.242861][ T5360] dump_stack_lvl+0x169/0x1d8 [ 206.247541][ T5360] ? thaw_kernel_threads+0x220/0x220 [ 206.252851][ T5360] ? show_regs_print_info+0x18/0x18 [ 206.258048][ T5360] ? stack_trace_save+0x98/0xe0 [ 206.262890][ T5360] dump_stack+0x15/0x1c [ 206.267034][ T5360] should_fail+0x3c1/0x510 [ 206.271439][ T5360] ? radix_tree_node_alloc+0x18e/0x380 [ 206.276887][ T5360] __should_failslab+0xa4/0xe0 [ 206.281639][ T5360] should_failslab+0x9/0x20 [ 206.286128][ T5360] kmem_cache_alloc+0x3d/0x2e0 [ 206.290881][ T5360] ? kobject_add+0x154/0x210 [ 206.295490][ T5360] ? device_add+0x3e7/0xbf0 [ 206.299991][ T5360] ? netdev_register_kobject+0x179/0x320 [ 206.305618][ T5360] radix_tree_node_alloc+0x18e/0x380 [ 206.310890][ T5360] idr_get_free+0x285/0x8f0 [ 206.315382][ T5360] idr_alloc_cyclic+0x196/0x530 [ 206.320222][ T5360] ? idr_alloc+0x2a0/0x2a0 [ 206.324628][ T5360] ? __kasan_check_write+0x14/0x20 [ 206.329749][ T5360] ? _raw_spin_lock+0x8e/0xe0 [ 206.334421][ T5360] ? debug_smp_processor_id+0x17/0x20 [ 206.339785][ T5360] __kernfs_new_node+0x120/0x680 [ 206.344715][ T5360] ? kernfs_new_node+0x260/0x260 [ 206.349647][ T5360] ? from_kuid_munged+0x690/0x690 [ 206.354666][ T5360] ? net_ns_get_ownership+0xf8/0x180 [ 206.359942][ T5360] kernfs_new_node+0x150/0x260 [ 206.364693][ T5360] kernfs_create_dir_ns+0x47/0x130 [ 206.369879][ T5360] sysfs_create_dir_ns+0x11c/0x280 [ 206.374980][ T5360] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 206.381033][ T5360] ? sysfs_warn_dup+0xa0/0xa0 [ 206.385699][ T5360] ? _raw_spin_lock+0x8e/0xe0 [ 206.390362][ T5360] ? net_namespace+0xd/0x40 [ 206.394858][ T5360] kobject_add_internal+0x755/0xda0 [ 206.400044][ T5360] kobject_add+0x154/0x210 [ 206.404449][ T5360] ? _raw_spin_lock+0x8e/0xe0 [ 206.409114][ T5360] ? kobject_init+0x1d0/0x1d0 [ 206.413798][ T5360] ? __kasan_check_write+0x14/0x20 [ 206.418896][ T5360] ? mutex_unlock+0x1c/0x40 [ 206.423386][ T5360] ? get_device_parent+0x2a1/0x410 [ 206.428490][ T5360] device_add+0x3e7/0xbf0 [ 206.432812][ T5360] ? device_initialize+0x1e1/0x420 [ 206.437917][ T5360] netdev_register_kobject+0x179/0x320 [ 206.443361][ T5360] ? raw_notifier_call_chain+0xe9/0x100 [ 206.448896][ T5360] register_netdevice+0xddd/0x13c0 [ 206.453999][ T5360] ? netif_stacked_transfer_operstate+0x220/0x220 [ 206.460400][ T5360] ? full_name_hash+0xa0/0xf0 [ 206.465067][ T5360] ppp_dev_configure+0x814/0xac0 [ 206.469995][ T5360] ppp_ioctl+0x6b9/0x1550 [ 206.474309][ T5360] ? ppp_poll+0x250/0x250 [ 206.478636][ T5360] ? __fget_files+0x2c4/0x320 [ 206.483304][ T5360] ? security_file_ioctl+0x84/0xa0 [ 206.488417][ T5360] ? ppp_poll+0x250/0x250 [ 206.492742][ T5360] __se_sys_ioctl+0x121/0x1a0 [ 206.497408][ T5360] __x64_sys_ioctl+0x7b/0x90 [ 206.501988][ T5360] do_syscall_64+0x31/0x40 [ 206.506390][ T5360] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 206.512269][ T5360] RIP: 0033:0x7fbca2c9d929 [ 206.516672][ T5360] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 206.536272][ T5360] RSP: 002b:00007fbca1306038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 206.544678][ T5360] RAX: ffffffffffffffda RBX: 00007fbca2ec4fa0 RCX: 00007fbca2c9d929 [ 206.552638][ T5360] RDX: 000000110c230000 RSI: 00000000c004743e RDI: 000000000000000a [ 206.560618][ T5360] RBP: 00007fbca1306090 R08: 0000000000000000 R09: 0000000000000000 [ 206.568597][ T5360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 206.576580][ T5360] R13: 0000000000000000 R14: 00007fbca2ec4fa0 R15: 00007ffe080e8aa8 [ 207.514423][ T5391] device syzkaller0 entered promiscuous mode [ 207.566515][ T5400] device syzkaller0 entered promiscuous mode [ 207.612026][ T5406] device wg2 left promiscuous mode [ 207.618630][ T5409] device wg2 entered promiscuous mode [ 208.308627][ T5446] syz.0.1853[5446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.308676][ T5446] syz.0.1853[5446] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.394203][ T5455] device syzkaller0 entered promiscuous mode [ 208.779817][ T5475] device wg2 entered promiscuous mode [ 209.131412][ T5483] device syzkaller0 entered promiscuous mode [ 209.141668][ T5486] syz.3.1868[5486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.141716][ T5486] syz.3.1868[5486] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 209.304957][ T5491] device syzkaller0 entered promiscuous mode [ 209.766314][ T5511] FAULT_INJECTION: forcing a failure. [ 209.766314][ T5511] name failslab, interval 1, probability 0, space 0, times 0 [ 209.819478][ T5511] CPU: 0 PID: 5511 Comm: syz.1.1878 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 209.830798][ T5511] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 209.840859][ T5511] Call Trace: [ 209.841045][ T5510] device syzkaller0 entered promiscuous mode [ 209.844163][ T5511] __dump_stack+0x21/0x24 [ 209.844182][ T5511] dump_stack_lvl+0x169/0x1d8 [ 209.859152][ T5511] ? show_regs_print_info+0x18/0x18 [ 209.864362][ T5511] ? htab_map_alloc+0x99/0x970 [ 209.869125][ T5511] ? __kasan_kmalloc+0xec/0x110 [ 209.873967][ T5511] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 209.879502][ T5511] dump_stack+0x15/0x1c [ 209.883645][ T5511] should_fail+0x3c1/0x510 [ 209.888050][ T5511] ? __get_vm_area_node+0x113/0x450 [ 209.893232][ T5511] __should_failslab+0xa4/0xe0 [ 209.897985][ T5511] should_failslab+0x9/0x20 [ 209.902471][ T5511] kmem_cache_alloc_trace+0x3a/0x2e0 [ 209.907744][ T5511] __get_vm_area_node+0x113/0x450 [ 209.912763][ T5511] __vmalloc_node_range+0xe0/0x780 [ 209.917862][ T5511] ? htab_map_alloc+0x4b6/0x970 [ 209.922703][ T5511] bpf_map_area_alloc+0xd5/0xe0 [ 209.927544][ T5511] ? htab_map_alloc+0x4b6/0x970 [ 209.932383][ T5511] htab_map_alloc+0x4b6/0x970 [ 209.937048][ T5511] htab_of_map_alloc+0x55/0xc0 [ 209.941823][ T5511] map_create+0x441/0x2190 [ 209.946229][ T5511] __se_sys_bpf+0x203/0x680 [ 209.950720][ T5511] ? __x64_sys_bpf+0x90/0x90 [ 209.955302][ T5511] ? debug_smp_processor_id+0x17/0x20 [ 209.960669][ T5511] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 209.966724][ T5511] __x64_sys_bpf+0x7b/0x90 [ 209.971131][ T5511] do_syscall_64+0x31/0x40 [ 209.975536][ T5511] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 209.981430][ T5511] RIP: 0033:0x7fb6adc65929 [ 209.985842][ T5511] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 210.005434][ T5511] RSP: 002b:00007fb6ac2ad038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 210.013833][ T5511] RAX: ffffffffffffffda RBX: 00007fb6ade8d080 RCX: 00007fb6adc65929 [ 210.021814][ T5511] RDX: 0000000000000048 RSI: 00002000000008c0 RDI: 0000000000000000 [ 210.029774][ T5511] RBP: 00007fb6ac2ad090 R08: 0000000000000000 R09: 0000000000000000 [ 210.037733][ T5511] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 210.045701][ T5511] R13: 0000000000000000 R14: 00007fb6ade8d080 R15: 00007ffdc1b7b888 [ 210.167812][ T5518] device syzkaller0 entered promiscuous mode [ 210.223114][ T5525] syz.4.1884[5525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.223162][ T5525] syz.4.1884[5525] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.335396][ T5535] device syzkaller0 entered promiscuous mode [ 210.356176][ T5520] FAULT_INJECTION: forcing a failure. [ 210.356176][ T5520] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 210.403089][ T5520] CPU: 0 PID: 5520 Comm: syz.3.1882 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 210.414415][ T5520] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 210.424485][ T5520] Call Trace: [ 210.427794][ T5520] __dump_stack+0x21/0x24 [ 210.432138][ T5520] dump_stack_lvl+0x169/0x1d8 [ 210.436826][ T5520] ? show_regs_print_info+0x18/0x18 [ 210.442029][ T5520] ? slab_free_freelist_hook+0xc5/0x190 [ 210.447592][ T5520] dump_stack+0x15/0x1c [ 210.451771][ T5520] should_fail+0x3c1/0x510 [ 210.456196][ T5520] should_fail_usercopy+0x1a/0x20 [ 210.461229][ T5520] fpu__restore_sig+0x1e5/0x1240 [ 210.466181][ T5520] ? recalc_sigpending+0x1ac/0x230 [ 210.471310][ T5520] ? copy_fpstate_to_sigframe+0xb40/0xb40 [ 210.477044][ T5520] ? __kasan_check_write+0x14/0x20 [ 210.482176][ T5520] ? recalc_sigpending+0x1ac/0x230 [ 210.487299][ T5520] ? __kasan_check_write+0x14/0x20 [ 210.492541][ T5520] ? _copy_from_user+0x95/0xd0 [ 210.497327][ T5520] __ia32_sys_rt_sigreturn+0x5d0/0x6c0 [ 210.502800][ T5520] ? KSTK_ESP+0x60/0x60 [ 210.507171][ T5520] ? fpregs_assert_state_consistent+0xb1/0xe0 [ 210.513264][ T5520] do_syscall_64+0x31/0x40 [ 210.517708][ T5520] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 210.523605][ T5520] RIP: 0033:0x7f3efd81c929 [ 210.528027][ T5520] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 210.547667][ T5520] RSP: 002b:00007f3efbe85038 EFLAGS: 00000246 [ 210.553761][ T5520] RAX: fffffffffffffffc RBX: 00007f3efda43fa0 RCX: 00007f3efd81c929 [ 210.561744][ T5520] RDX: 0000000000000102 RSI: 0000200000000340 RDI: 0000000000000006 [ 210.569723][ T5520] RBP: 00007f3efbe85090 R08: 0000000000000000 R09: 0000000000000000 [ 210.577702][ T5520] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 210.585686][ T5520] R13: 0000000000000000 R14: 00007f3efda43fa0 R15: 00007ffeef890028 [ 210.940289][ T5542] device wg2 left promiscuous mode [ 210.963072][ T5559] FAULT_INJECTION: forcing a failure. [ 210.963072][ T5559] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 210.989332][ T5563] FAULT_INJECTION: forcing a failure. [ 210.989332][ T5563] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 210.991853][ T5557] device syzkaller0 entered promiscuous mode [ 211.002530][ T5563] CPU: 1 PID: 5563 Comm: syz.4.1899 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 211.019700][ T5563] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 211.029749][ T5563] Call Trace: [ 211.033040][ T5563] __dump_stack+0x21/0x24 [ 211.037377][ T5563] dump_stack_lvl+0x169/0x1d8 [ 211.042060][ T5563] ? thaw_kernel_threads+0x220/0x220 [ 211.047338][ T5563] ? vsnprintf+0x1871/0x1960 [ 211.051923][ T5563] ? show_regs_print_info+0x18/0x18 [ 211.057125][ T5563] dump_stack+0x15/0x1c [ 211.061293][ T5563] should_fail+0x3c1/0x510 [ 211.065700][ T5563] should_fail_usercopy+0x1a/0x20 [ 211.070710][ T5563] _copy_to_user+0x20/0x90 [ 211.075111][ T5563] simple_read_from_buffer+0xe9/0x160 [ 211.080470][ T5563] proc_fail_nth_read+0x19a/0x210 [ 211.085481][ T5563] ? proc_fault_inject_write+0x2f0/0x2f0 [ 211.091105][ T5563] ? rw_verify_area+0x1c0/0x360 [ 211.095958][ T5563] ? proc_fault_inject_write+0x2f0/0x2f0 [ 211.101583][ T5563] vfs_read+0x1fe/0xa10 [ 211.105726][ T5563] ? kernel_read+0x70/0x70 [ 211.110139][ T5563] ? __kasan_check_write+0x14/0x20 [ 211.115244][ T5563] ? mutex_lock+0x8c/0xe0 [ 211.119561][ T5563] ? mutex_trylock+0xa0/0xa0 [ 211.124141][ T5563] ? __fget_files+0x2c4/0x320 [ 211.128809][ T5563] ? __fdget_pos+0x2d2/0x380 [ 211.133391][ T5563] ? ksys_read+0x71/0x240 [ 211.137731][ T5563] ksys_read+0x140/0x240 [ 211.141959][ T5563] ? vfs_write+0xd60/0xd60 [ 211.146363][ T5563] __x64_sys_read+0x7b/0x90 [ 211.150851][ T5563] do_syscall_64+0x31/0x40 [ 211.155256][ T5563] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 211.161134][ T5563] RIP: 0033:0x7fbca2c9c33c [ 211.165539][ T5563] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 211.185131][ T5563] RSP: 002b:00007fbca1306030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 211.193534][ T5563] RAX: ffffffffffffffda RBX: 00007fbca2ec4fa0 RCX: 00007fbca2c9c33c [ 211.201600][ T5563] RDX: 000000000000000f RSI: 00007fbca13060a0 RDI: 0000000000000008 [ 211.209559][ T5563] RBP: 00007fbca1306090 R08: 0000000000000000 R09: 0000000000000000 [ 211.217520][ T5563] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 211.225489][ T5563] R13: 0000000000000000 R14: 00007fbca2ec4fa0 R15: 00007ffe080e8aa8 [ 211.235806][ T5559] CPU: 1 PID: 5559 Comm: syz.0.1897 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 211.247103][ T5559] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 211.257169][ T5559] Call Trace: [ 211.260479][ T5559] __dump_stack+0x21/0x24 [ 211.264821][ T5559] dump_stack_lvl+0x169/0x1d8 [ 211.269505][ T5559] ? thaw_kernel_threads+0x220/0x220 [ 211.274889][ T5559] ? show_regs_print_info+0x18/0x18 [ 211.280095][ T5559] dump_stack+0x15/0x1c [ 211.284253][ T5559] should_fail+0x3c1/0x510 [ 211.288674][ T5559] should_fail_usercopy+0x1a/0x20 [ 211.293700][ T5559] _copy_to_user+0x20/0x90 [ 211.298127][ T5559] simple_read_from_buffer+0xe9/0x160 [ 211.303528][ T5559] proc_fail_nth_read+0x19a/0x210 [ 211.308553][ T5559] ? proc_fault_inject_write+0x2f0/0x2f0 [ 211.314281][ T5559] ? rw_verify_area+0x1c0/0x360 [ 211.319137][ T5559] ? proc_fault_inject_write+0x2f0/0x2f0 [ 211.324772][ T5559] vfs_read+0x1fe/0xa10 [ 211.328938][ T5559] ? kernel_read+0x70/0x70 [ 211.333358][ T5559] ? __kasan_check_write+0x14/0x20 [ 211.338472][ T5559] ? mutex_lock+0x8c/0xe0 [ 211.342802][ T5559] ? mutex_trylock+0xa0/0xa0 [ 211.347398][ T5559] ? __fget_files+0x2c4/0x320 [ 211.352080][ T5559] ? __fdget_pos+0x2d2/0x380 [ 211.356667][ T5559] ? ksys_read+0x71/0x240 [ 211.361000][ T5559] ksys_read+0x140/0x240 [ 211.365268][ T5559] ? vfs_write+0xd60/0xd60 [ 211.369689][ T5559] __x64_sys_read+0x7b/0x90 [ 211.374205][ T5559] do_syscall_64+0x31/0x40 [ 211.378637][ T5559] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 211.384537][ T5559] RIP: 0033:0x7fdff3f3b33c [ 211.388956][ T5559] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 211.408562][ T5559] RSP: 002b:00007fdff25a5030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 211.416985][ T5559] RAX: ffffffffffffffda RBX: 00007fdff4163fa0 RCX: 00007fdff3f3b33c [ 211.424953][ T5559] RDX: 000000000000000f RSI: 00007fdff25a50a0 RDI: 0000000000000008 [ 211.432926][ T5559] RBP: 00007fdff25a5090 R08: 0000000000000000 R09: 0000000000000000 [ 211.440909][ T5559] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 211.448891][ T5559] R13: 0000000000000000 R14: 00007fdff4163fa0 R15: 00007ffc41031a78 [ 211.542164][ T5573] FAULT_INJECTION: forcing a failure. [ 211.542164][ T5573] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 211.555403][ T5573] CPU: 0 PID: 5573 Comm: syz.2.1904 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 211.566687][ T5573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 211.576857][ T5573] Call Trace: [ 211.580151][ T5573] __dump_stack+0x21/0x24 [ 211.584475][ T5573] dump_stack_lvl+0x169/0x1d8 [ 211.589153][ T5573] ? show_regs_print_info+0x18/0x18 [ 211.594347][ T5573] dump_stack+0x15/0x1c [ 211.598503][ T5573] should_fail+0x3c1/0x510 [ 211.602913][ T5573] should_fail_usercopy+0x1a/0x20 [ 211.607932][ T5573] _copy_from_iter+0x1d1/0x9f0 [ 211.612702][ T5573] ? __kasan_check_read+0x11/0x20 [ 211.617729][ T5573] ? __check_object_size+0x2f4/0x3c0 [ 211.623004][ T5573] skb_copy_datagram_from_iter+0xfa/0x6b0 [ 211.628721][ T5573] tun_get_user+0x140a/0x3090 [ 211.633399][ T5573] ? tun_do_read+0x1c00/0x1c00 [ 211.638155][ T5573] ? kstrtouint_from_user+0x1a0/0x200 [ 211.643561][ T5573] ? __fsnotify_parent+0x5f5/0x6c0 [ 211.648667][ T5573] ? avc_policy_seqno+0x1b/0x70 [ 211.653512][ T5573] ? selinux_file_permission+0x2a5/0x510 [ 211.659138][ T5573] ? fsnotify_perm+0x66/0x4b0 [ 211.663855][ T5573] tun_chr_write_iter+0x1bf/0x270 [ 211.668874][ T5573] vfs_write+0x725/0xd60 [ 211.673116][ T5573] ? kernel_write+0x3c0/0x3c0 [ 211.677788][ T5573] ? __fget_files+0x2c4/0x320 [ 211.682459][ T5573] ? __fdget_pos+0x1f7/0x380 [ 211.687036][ T5573] ? ksys_write+0x71/0x240 [ 211.691441][ T5573] ksys_write+0x140/0x240 [ 211.695761][ T5573] ? __ia32_sys_read+0x90/0x90 [ 211.700518][ T5573] ? fpu__clear_all+0x20/0x20 [ 211.705193][ T5573] __x64_sys_write+0x7b/0x90 [ 211.709773][ T5573] do_syscall_64+0x31/0x40 [ 211.714181][ T5573] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 211.720063][ T5573] RIP: 0033:0x7f71c50d9929 [ 211.724471][ T5573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 211.744063][ T5573] RSP: 002b:00007f71c3742038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 211.752462][ T5573] RAX: ffffffffffffffda RBX: 00007f71c5300fa0 RCX: 00007f71c50d9929 [ 211.760419][ T5573] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 211.768379][ T5573] RBP: 00007f71c3742090 R08: 0000000000000000 R09: 0000000000000000 [ 211.776339][ T5573] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 211.784301][ T5573] R13: 0000000000000000 R14: 00007f71c5300fa0 R15: 00007ffee1c4e1f8 [ 212.102213][ T5588] €Â0: renamed from pim6reg1 [ 212.295948][ T5581] device wg2 left promiscuous mode [ 213.885545][ T5647] FAULT_INJECTION: forcing a failure. [ 213.885545][ T5647] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 213.919004][ T5647] CPU: 1 PID: 5647 Comm: syz.2.1930 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 213.930329][ T5647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 213.940391][ T5647] Call Trace: [ 213.943696][ T5647] __dump_stack+0x21/0x24 [ 213.948031][ T5647] dump_stack_lvl+0x169/0x1d8 [ 213.952716][ T5647] ? thaw_kernel_threads+0x220/0x220 [ 213.958003][ T5647] ? show_regs_print_info+0x18/0x18 [ 213.963198][ T5647] ? selinux_capable+0x29c/0x380 [ 213.968140][ T5647] dump_stack+0x15/0x1c [ 213.972319][ T5647] should_fail+0x3c1/0x510 [ 213.976739][ T5647] should_fail_usercopy+0x1a/0x20 [ 213.981765][ T5647] _copy_from_user+0x20/0xd0 [ 213.986360][ T5647] strndup_user+0xb1/0x150 [ 213.990808][ T5647] perf_uprobe_init+0x62/0x1a0 [ 213.995667][ T5647] ? perf_uprobe_event_init+0xf9/0x190 [ 214.001135][ T5647] perf_uprobe_event_init+0x10b/0x190 [ 214.006511][ T5647] perf_try_init_event+0x14a/0x430 [ 214.011622][ T5647] perf_event_alloc+0xcda/0x1990 [ 214.016563][ T5647] __se_sys_perf_event_open+0x6f7/0x1b10 [ 214.022203][ T5647] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 214.027852][ T5647] ? fpu__clear_all+0x20/0x20 [ 214.032537][ T5647] __x64_sys_perf_event_open+0xbf/0xd0 [ 214.038003][ T5647] do_syscall_64+0x31/0x40 [ 214.042429][ T5647] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 214.048323][ T5647] RIP: 0033:0x7f71c50d9929 [ 214.052747][ T5647] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 214.072362][ T5647] RSP: 002b:00007f71c3742038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 214.080780][ T5647] RAX: ffffffffffffffda RBX: 00007f71c5300fa0 RCX: 00007f71c50d9929 [ 214.088760][ T5647] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000001080 [ 214.096743][ T5647] RBP: 00007f71c3742090 R08: 0000000000000000 R09: 0000000000000000 [ 214.104708][ T5647] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 214.112685][ T5647] R13: 0000000000000000 R14: 00007f71c5300fa0 R15: 00007ffee1c4e1f8 [ 215.455338][ T5681] device syzkaller0 entered promiscuous mode [ 215.770376][ T5684] device syzkaller0 entered promiscuous mode [ 216.482987][ T5718] €Â0: renamed from pim6reg1 [ 216.491379][ T5720] FAULT_INJECTION: forcing a failure. [ 216.491379][ T5720] name failslab, interval 1, probability 0, space 0, times 0 [ 216.546311][ T5720] CPU: 0 PID: 5720 Comm: syz.3.1952 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 216.557624][ T5720] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 216.567686][ T5720] Call Trace: [ 216.570996][ T5720] __dump_stack+0x21/0x24 [ 216.575333][ T5720] dump_stack_lvl+0x169/0x1d8 [ 216.580029][ T5720] ? thaw_kernel_threads+0x220/0x220 [ 216.585322][ T5720] ? show_regs_print_info+0x18/0x18 [ 216.590536][ T5720] dump_stack+0x15/0x1c [ 216.594700][ T5720] should_fail+0x3c1/0x510 [ 216.599120][ T5720] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 216.604581][ T5720] __should_failslab+0xa4/0xe0 [ 216.609362][ T5720] should_failslab+0x9/0x20 [ 216.613866][ T5720] __kmalloc_track_caller+0x5f/0x320 [ 216.619152][ T5720] ? kmem_cache_alloc+0x165/0x2e0 [ 216.624177][ T5720] ? __alloc_skb+0x9e/0x520 [ 216.628687][ T5720] ? rtmsg_ifinfo_build_skb+0x7c/0x180 [ 216.634155][ T5720] __alloc_skb+0xdc/0x520 [ 216.638495][ T5720] rtmsg_ifinfo_build_skb+0x7c/0x180 [ 216.643791][ T5720] rtnetlink_event+0xd2/0x1a0 [ 216.648477][ T5720] raw_notifier_call_chain+0x90/0x100 [ 216.653862][ T5720] dev_set_mac_address+0x318/0x420 [ 216.658987][ T5720] ? dev_pre_changeaddr_notify+0x1c0/0x1c0 [ 216.664807][ T5720] dev_set_mac_address_user+0x31/0x50 [ 216.670188][ T5720] dev_ifsioc+0x65c/0xa50 [ 216.674530][ T5720] ? dev_ioctl+0xb80/0xb80 [ 216.678951][ T5720] dev_ioctl+0x550/0xb80 [ 216.683213][ T5720] sock_do_ioctl+0x235/0x330 [ 216.687805][ T5720] ? __bpf_trace_kmem_free+0x6f/0x90 [ 216.693097][ T5720] ? sock_show_fdinfo+0xa0/0xa0 [ 216.697962][ T5720] ? selinux_file_ioctl+0x377/0x480 [ 216.703160][ T5720] ? mutex_trylock+0xa0/0xa0 [ 216.707749][ T5720] ? __fget_files+0x2c4/0x320 [ 216.712435][ T5720] sock_ioctl+0x504/0x710 [ 216.716766][ T5720] ? sock_poll+0x360/0x360 [ 216.721190][ T5720] ? __fget_files+0x2c4/0x320 [ 216.725870][ T5720] ? security_file_ioctl+0x84/0xa0 [ 216.730978][ T5720] ? sock_poll+0x360/0x360 [ 216.735393][ T5720] __se_sys_ioctl+0x121/0x1a0 [ 216.740068][ T5720] __x64_sys_ioctl+0x7b/0x90 [ 216.744662][ T5720] do_syscall_64+0x31/0x40 [ 216.749084][ T5720] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 216.754983][ T5720] RIP: 0033:0x7f3efd81c929 [ 216.759416][ T5720] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 216.779039][ T5720] RSP: 002b:00007f3efbe43038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 216.787457][ T5720] RAX: ffffffffffffffda RBX: 00007f3efda44160 RCX: 00007f3efd81c929 [ 216.795444][ T5720] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 000000000000000e [ 216.803418][ T5720] RBP: 00007f3efbe43090 R08: 0000000000000000 R09: 0000000000000000 [ 216.811387][ T5720] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 216.819375][ T5720] R13: 0000000000000000 R14: 00007f3efda44160 R15: 00007ffeef890028 [ 217.978677][ T5748] device syzkaller0 entered promiscuous mode [ 218.094928][ T5748] device pim6reg1 entered promiscuous mode [ 218.745642][ T5762] ÿÿÿÿÿÿ: renamed from vlan1 [ 219.260301][ T5774] device pim6reg1 entered promiscuous mode [ 219.363464][ T5777] device syzkaller0 entered promiscuous mode [ 219.655292][ T5772] device syzkaller0 entered promiscuous mode [ 220.207165][ T5793] device wg2 left promiscuous mode [ 220.235434][ T5803] FAULT_INJECTION: forcing a failure. [ 220.235434][ T5803] name failslab, interval 1, probability 0, space 0, times 0 [ 220.359508][ T5803] CPU: 0 PID: 5803 Comm: syz.3.1982 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 220.370840][ T5803] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 220.380911][ T5803] Call Trace: [ 220.384225][ T5803] __dump_stack+0x21/0x24 [ 220.388573][ T5803] dump_stack_lvl+0x169/0x1d8 [ 220.393269][ T5803] ? show_regs_print_info+0x18/0x18 [ 220.398491][ T5803] dump_stack+0x15/0x1c [ 220.402656][ T5803] should_fail+0x3c1/0x510 [ 220.407085][ T5803] ? bpf_map_area_alloc+0x49/0xe0 [ 220.412118][ T5803] __should_failslab+0xa4/0xe0 [ 220.416884][ T5803] should_failslab+0x9/0x20 [ 220.421389][ T5803] __kmalloc+0x60/0x330 [ 220.425552][ T5803] bpf_map_area_alloc+0x49/0xe0 [ 220.430405][ T5803] prealloc_init+0x147/0x810 [ 220.435002][ T5803] ? __kmalloc+0x1a7/0x330 [ 220.439423][ T5803] htab_map_alloc+0x688/0x970 [ 220.444106][ T5803] map_create+0x441/0x2190 [ 220.448529][ T5803] __se_sys_bpf+0x203/0x680 [ 220.453033][ T5803] ? __x64_sys_bpf+0x90/0x90 [ 220.457632][ T5803] ? fpu__clear_all+0x20/0x20 [ 220.462318][ T5803] __x64_sys_bpf+0x7b/0x90 [ 220.466737][ T5803] do_syscall_64+0x31/0x40 [ 220.471159][ T5803] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 220.477066][ T5803] RIP: 0033:0x7f3efd81c929 [ 220.481574][ T5803] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 220.501305][ T5803] RSP: 002b:00007f3efbe85038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 220.509731][ T5803] RAX: ffffffffffffffda RBX: 00007f3efda43fa0 RCX: 00007f3efd81c929 [ 220.517707][ T5803] RDX: 0000000000000050 RSI: 0000200000001040 RDI: 0000000000000000 [ 220.525683][ T5803] RBP: 00007f3efbe85090 R08: 0000000000000000 R09: 0000000000000000 [ 220.533661][ T5803] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 220.541664][ T5803] R13: 0000000000000000 R14: 00007f3efda43fa0 R15: 00007ffeef890028 [ 220.845714][ T5812] device syzkaller0 entered promiscuous mode [ 221.479269][ T5821] device wg2 left promiscuous mode [ 222.081468][ T5842] device pim6reg1 entered promiscuous mode [ 222.380202][ T5849] device syzkaller0 entered promiscuous mode [ 223.607517][ T5890] FAULT_INJECTION: forcing a failure. [ 223.607517][ T5890] name failslab, interval 1, probability 0, space 0, times 0 [ 223.620384][ T5890] CPU: 0 PID: 5890 Comm: syz.1.2015 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 223.631680][ T5890] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 223.641749][ T5890] Call Trace: [ 223.645052][ T5890] __dump_stack+0x21/0x24 [ 223.649389][ T5890] dump_stack_lvl+0x169/0x1d8 [ 223.654091][ T5890] ? thaw_kernel_threads+0x220/0x220 [ 223.659381][ T5890] ? show_regs_print_info+0x18/0x18 [ 223.664583][ T5890] ? __kasan_check_write+0x14/0x20 [ 223.669780][ T5890] ? skb_release_data+0x3b3/0x670 [ 223.674934][ T5890] dump_stack+0x15/0x1c [ 223.679097][ T5890] should_fail+0x3c1/0x510 [ 223.683514][ T5890] ? skb_clone+0x1e9/0x380 [ 223.687938][ T5890] __should_failslab+0xa4/0xe0 [ 223.692699][ T5890] should_failslab+0x9/0x20 [ 223.697202][ T5890] kmem_cache_alloc+0x3d/0x2e0 [ 223.701965][ T5890] ? __bpf_redirect+0x6a7/0xe30 [ 223.706814][ T5890] skb_clone+0x1e9/0x380 [ 223.711052][ T5890] bpf_clone_redirect+0xa7/0x380 [ 223.715984][ T5890] bpf_prog_e2f29814702bf05a+0x56/0xb30 [ 223.721718][ T5890] ? sk_get_meminfo+0x240/0x490 [ 223.726565][ T5890] ? bpf_prog_test_run_skb+0x31d/0x10b0 [ 223.732671][ T5890] ? bpf_prog_test_run+0x350/0x3c0 [ 223.737789][ T5890] ? __se_sys_bpf+0x49f/0x680 [ 223.742460][ T5890] ? __x64_sys_bpf+0x7b/0x90 [ 223.747047][ T5890] ? do_syscall_64+0x31/0x40 [ 223.751635][ T5890] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 223.757713][ T5890] ? __kasan_check_read+0x11/0x20 [ 223.762738][ T5890] ? bpf_test_timer_continue+0x147/0x410 [ 223.768368][ T5890] bpf_test_run+0x310/0x9b0 [ 223.772869][ T5890] ? convert___skb_to_skb+0x4f0/0x4f0 [ 223.778237][ T5890] ? eth_get_headlen+0x1f0/0x1f0 [ 223.783174][ T5890] ? convert___skb_to_skb+0x41/0x4f0 [ 223.788452][ T5890] bpf_prog_test_run_skb+0x9c2/0x10b0 [ 223.793820][ T5890] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 223.799708][ T5890] bpf_prog_test_run+0x350/0x3c0 [ 223.804637][ T5890] __se_sys_bpf+0x49f/0x680 [ 223.809134][ T5890] ? __x64_sys_bpf+0x90/0x90 [ 223.813721][ T5890] ? fpu__clear_all+0x20/0x20 [ 223.818392][ T5890] __x64_sys_bpf+0x7b/0x90 [ 223.822799][ T5890] do_syscall_64+0x31/0x40 [ 223.827215][ T5890] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 223.833098][ T5890] RIP: 0033:0x7fb6adc65929 [ 223.837509][ T5890] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 223.857108][ T5890] RSP: 002b:00007fb6ac2ce038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 223.865516][ T5890] RAX: ffffffffffffffda RBX: 00007fb6ade8cfa0 RCX: 00007fb6adc65929 [ 223.873479][ T5890] RDX: 0000000000000028 RSI: 0000200000000080 RDI: 000000000000000a [ 223.881447][ T5890] RBP: 00007fb6ac2ce090 R08: 0000000000000000 R09: 0000000000000000 [ 223.889416][ T5890] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 223.897383][ T5890] R13: 0000000000000000 R14: 00007fb6ade8cfa0 R15: 00007ffdc1b7b888 [ 224.017962][ T5893] device syzkaller0 entered promiscuous mode [ 224.632284][ T5916] €Â0: renamed from pim6reg1 [ 225.298414][ T5928] device syzkaller0 entered promiscuous mode [ 225.538440][ T5941] device syzkaller0 entered promiscuous mode [ 226.110262][ T5951] €Â0: renamed from pim6reg1 [ 226.465819][ T5959] device veth0_vlan left promiscuous mode [ 226.486736][ T5959] device veth0_vlan entered promiscuous mode [ 226.687459][ T5975] device syzkaller0 entered promiscuous mode [ 226.909246][ T5980] €Â0: renamed from pim6reg1 [ 227.488217][ T6002] device syzkaller0 entered promiscuous mode [ 227.966900][ T6012] device veth0_vlan left promiscuous mode [ 228.084287][ T6012] device veth0_vlan entered promiscuous mode [ 228.191392][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 228.203115][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 228.216427][ T7] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 232.392121][ T6147] device veth0_vlan left promiscuous mode [ 232.417221][ T6147] device veth0_vlan entered promiscuous mode [ 235.076905][ T6198] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.085723][ T6198] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.170923][ T6203] device bridge_slave_1 left promiscuous mode [ 235.197352][ T6203] bridge0: port 2(bridge_slave_1) entered disabled state [ 235.247750][ T6203] device bridge_slave_0 left promiscuous mode [ 235.254496][ T6206] syz.4.2136[6206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.254550][ T6206] syz.4.2136[6206] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.286887][ T6203] bridge0: port 1(bridge_slave_0) entered disabled state [ 235.620892][ T6223] device syzkaller0 entered promiscuous mode [ 236.771356][ T6272] €Â0: renamed from pim6reg1 [ 236.916140][ T6277] device syzkaller0 entered promiscuous mode [ 238.397264][ T6299] device wg2 entered promiscuous mode [ 238.765658][ T6313] €Â0: renamed from pim6reg1 [ 239.709561][ T6345] FAULT_INJECTION: forcing a failure. [ 239.709561][ T6345] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 239.752673][ T6347] €Â0: renamed from pim6reg1 [ 239.970831][ T6345] CPU: 1 PID: 6345 Comm: syz.2.2185 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 239.982160][ T6345] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 239.992244][ T6345] Call Trace: [ 239.995570][ T6345] __dump_stack+0x21/0x24 [ 239.999923][ T6345] dump_stack_lvl+0x169/0x1d8 [ 240.004621][ T6345] ? show_regs_print_info+0x18/0x18 [ 240.009827][ T6345] ? _raw_spin_unlock_irqrestore+0x5b/0x80 [ 240.015646][ T6345] dump_stack+0x15/0x1c [ 240.019812][ T6345] should_fail+0x3c1/0x510 [ 240.024230][ T6345] should_fail_usercopy+0x1a/0x20 [ 240.029282][ T6345] _copy_from_user+0x20/0xd0 [ 240.033884][ T6345] generic_map_update_batch+0x4a4/0x740 [ 240.039440][ T6345] ? bpf_enable_instrumentation+0x50/0x50 [ 240.045340][ T6345] ? __fdget+0x1a1/0x230 [ 240.049594][ T6345] ? bpf_enable_instrumentation+0x50/0x50 [ 240.055318][ T6345] bpf_map_do_batch+0x463/0x5f0 [ 240.060165][ T6345] __se_sys_bpf+0x55a/0x680 [ 240.064665][ T6345] ? __x64_sys_bpf+0x90/0x90 [ 240.069259][ T6345] ? fpu__clear_all+0x20/0x20 [ 240.073934][ T6345] __x64_sys_bpf+0x7b/0x90 [ 240.078347][ T6345] do_syscall_64+0x31/0x40 [ 240.082760][ T6345] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 240.088651][ T6345] RIP: 0033:0x7f71c50d9929 [ 240.093065][ T6345] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 240.112672][ T6345] RSP: 002b:00007f71c3742038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 240.121089][ T6345] RAX: ffffffffffffffda RBX: 00007f71c5300fa0 RCX: 00007f71c50d9929 [ 240.129053][ T6345] RDX: 0000000000000038 RSI: 0000200000000200 RDI: 000000000000001a [ 240.137025][ T6345] RBP: 00007f71c3742090 R08: 0000000000000000 R09: 0000000000000000 [ 240.145004][ T6345] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 240.152973][ T6345] R13: 0000000000000000 R14: 00007f71c5300fa0 R15: 00007ffee1c4e1f8 [ 241.502616][ T6383] €Â0: renamed from pim6reg1 [ 242.723843][ T6412] syz.1.2207[6412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.723932][ T6412] syz.1.2207[6412] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.097201][ T6438] device pim6reg1 entered promiscuous mode [ 244.825470][ T6447] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 244.950507][ T6455] FAULT_INJECTION: forcing a failure. [ 244.950507][ T6455] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 245.166130][ T6455] CPU: 1 PID: 6455 Comm: syz.0.2223 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 245.177572][ T6455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 245.187638][ T6455] Call Trace: [ 245.190950][ T6455] __dump_stack+0x21/0x24 [ 245.195296][ T6455] dump_stack_lvl+0x169/0x1d8 [ 245.200003][ T6455] ? show_regs_print_info+0x18/0x18 [ 245.205338][ T6455] ? memset+0x35/0x40 [ 245.209358][ T6455] dump_stack+0x15/0x1c [ 245.213514][ T6455] should_fail+0x3c1/0x510 [ 245.217935][ T6455] should_fail_usercopy+0x1a/0x20 [ 245.222972][ T6455] strncpy_from_user+0x24/0x2e0 [ 245.227825][ T6455] ? __kasan_check_write+0x14/0x20 [ 245.232936][ T6455] bpf_raw_tracepoint_open+0x346/0x790 [ 245.238398][ T6455] ? bpf_obj_get_info_by_fd+0x2c30/0x2c30 [ 245.244114][ T6455] ? selinux_bpf+0xce/0xf0 [ 245.248526][ T6455] ? security_bpf+0x82/0xa0 [ 245.253024][ T6455] __se_sys_bpf+0x418/0x680 [ 245.257519][ T6455] ? __x64_sys_bpf+0x90/0x90 [ 245.262110][ T6455] ? fpu__clear_all+0x20/0x20 [ 245.266782][ T6455] __x64_sys_bpf+0x7b/0x90 [ 245.271195][ T6455] do_syscall_64+0x31/0x40 [ 245.275604][ T6455] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 245.281485][ T6455] RIP: 0033:0x7fdff3f3c929 [ 245.285899][ T6455] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 245.305494][ T6455] RSP: 002b:00007fdff25a5038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 245.313899][ T6455] RAX: ffffffffffffffda RBX: 00007fdff4163fa0 RCX: 00007fdff3f3c929 [ 245.321867][ T6455] RDX: 0000000000000010 RSI: 00002000000001c0 RDI: 0000000000000011 [ 245.329830][ T6455] RBP: 00007fdff25a5090 R08: 0000000000000000 R09: 0000000000000000 [ 245.337796][ T6455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 245.345783][ T6455] R13: 0000000000000000 R14: 00007fdff4163fa0 R15: 00007ffc41031a78 [ 246.461438][ T24] audit: type=1400 audit(1750134191.280:145): avc: denied { create } for pid=6493 comm="syz.3.2237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 246.601919][ T24] audit: type=1400 audit(1750134191.370:146): avc: denied { create } for pid=6493 comm="syz.3.2237" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 247.011823][ T6503] FAULT_INJECTION: forcing a failure. [ 247.011823][ T6503] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 247.056782][ T6503] CPU: 1 PID: 6503 Comm: syz.4.2240 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 247.068105][ T6503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 247.078173][ T6503] Call Trace: [ 247.081477][ T6503] __dump_stack+0x21/0x24 [ 247.085814][ T6503] dump_stack_lvl+0x169/0x1d8 [ 247.090511][ T6503] ? show_regs_print_info+0x18/0x18 [ 247.095722][ T6503] dump_stack+0x15/0x1c [ 247.099908][ T6503] should_fail+0x3c1/0x510 [ 247.104334][ T6503] should_fail_usercopy+0x1a/0x20 [ 247.109371][ T6503] strncpy_from_user+0x24/0x2e0 [ 247.114495][ T6503] bpf_prog_load+0x15d/0x1420 [ 247.119181][ T6503] ? avc_has_perm+0x234/0x360 [ 247.123870][ T6503] ? avc_has_perm_noaudit+0x240/0x240 [ 247.129267][ T6503] ? map_freeze+0x320/0x320 [ 247.133787][ T6503] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 247.139612][ T6503] ? selinux_bpf+0xc7/0xf0 [ 247.144039][ T6503] ? security_bpf+0x82/0xa0 [ 247.148558][ T6503] __se_sys_bpf+0x442/0x680 [ 247.153074][ T6503] ? __x64_sys_bpf+0x90/0x90 [ 247.157680][ T6503] __x64_sys_bpf+0x7b/0x90 [ 247.162107][ T6503] do_syscall_64+0x31/0x40 [ 247.166542][ T6503] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 247.172446][ T6503] RIP: 0033:0x7fbca2c9d929 [ 247.176872][ T6503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 247.196580][ T6503] RSP: 002b:00007fbca1306038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 247.205107][ T6503] RAX: ffffffffffffffda RBX: 00007fbca2ec4fa0 RCX: 00007fbca2c9d929 [ 247.213100][ T6503] RDX: 0000000000000048 RSI: 00002000000054c0 RDI: 0000000000000005 [ 247.221098][ T6503] RBP: 00007fbca1306090 R08: 0000000000000000 R09: 0000000000000000 [ 247.229083][ T6503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 247.237070][ T6503] R13: 0000000000000000 R14: 00007fbca2ec4fa0 R15: 00007ffe080e8aa8 [ 248.589501][ T6546] device syzkaller0 entered promiscuous mode [ 249.603124][ T6569] device syzkaller0 entered promiscuous mode [ 249.764837][ T6578] €Â0: renamed from pim6reg1 [ 249.865377][ T6580] FAULT_INJECTION: forcing a failure. [ 249.865377][ T6580] name failslab, interval 1, probability 0, space 0, times 0 [ 249.878156][ T6580] CPU: 1 PID: 6580 Comm: syz.4.2266 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 249.889445][ T6580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 249.899513][ T6580] Call Trace: [ 249.902827][ T6580] __dump_stack+0x21/0x24 [ 249.907167][ T6580] dump_stack_lvl+0x169/0x1d8 [ 249.911857][ T6580] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 249.918024][ T6580] ? show_regs_print_info+0x18/0x18 [ 249.923240][ T6580] dump_stack+0x15/0x1c [ 249.927411][ T6580] should_fail+0x3c1/0x510 [ 249.931841][ T6580] ? radix_tree_node_alloc+0x80/0x380 [ 249.937230][ T6580] __should_failslab+0xa4/0xe0 [ 249.942020][ T6580] should_failslab+0x9/0x20 [ 249.946531][ T6580] kmem_cache_alloc+0x3d/0x2e0 [ 249.951307][ T6580] ? tipc_group_create+0x40e/0x650 [ 249.956428][ T6580] ? tipc_sk_join+0x15b/0x830 [ 249.961117][ T6580] ? tipc_setsockopt+0x684/0x900 [ 249.966072][ T6580] radix_tree_node_alloc+0x80/0x380 [ 249.971286][ T6580] idr_get_free+0x285/0x8f0 [ 249.975809][ T6580] idr_alloc+0x170/0x2a0 [ 249.980061][ T6580] ? idr_alloc_u32+0x2d0/0x2d0 [ 249.984840][ T6580] ? _raw_spin_lock_irq+0xe0/0xe0 [ 249.989872][ T6580] ? kmem_cache_alloc_trace+0x184/0x2e0 [ 249.995431][ T6580] ? tipc_conn_alloc+0x5a/0x460 [ 250.000293][ T6580] tipc_conn_alloc+0x284/0x460 [ 250.005072][ T6580] tipc_topsrv_kern_subscr+0x15e/0x380 [ 250.010540][ T6580] ? conn_put+0x320/0x320 [ 250.014882][ T6580] ? tipc_group_create+0xa1/0x650 [ 250.019922][ T6580] tipc_group_create+0x40e/0x650 [ 250.024873][ T6580] tipc_sk_join+0x15b/0x830 [ 250.029387][ T6580] ? refcount_dec_and_lock_irqsave+0xf1/0x100 [ 250.035479][ T6580] ? _copy_from_user+0x95/0xd0 [ 250.040253][ T6580] tipc_setsockopt+0x684/0x900 [ 250.045032][ T6580] ? tipc_shutdown+0x960/0x960 [ 250.049809][ T6580] ? security_socket_setsockopt+0x82/0xa0 [ 250.055534][ T6580] ? tipc_shutdown+0x960/0x960 [ 250.060309][ T6580] __sys_setsockopt+0x2ed/0x460 [ 250.065172][ T6580] ? __ia32_sys_recv+0xb0/0xb0 [ 250.069951][ T6580] ? irq_exit_rcu+0x9/0x10 [ 250.074393][ T6580] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 250.080211][ T6580] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 250.086393][ T6580] __x64_sys_setsockopt+0xbf/0xd0 [ 250.091444][ T6580] do_syscall_64+0x31/0x40 [ 250.095880][ T6580] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 250.101785][ T6580] RIP: 0033:0x7fbca2c9d929 [ 250.106218][ T6580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 250.125835][ T6580] RSP: 002b:00007fbca1306038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 250.134267][ T6580] RAX: ffffffffffffffda RBX: 00007fbca2ec4fa0 RCX: 00007fbca2c9d929 [ 250.142248][ T6580] RDX: 0000000000000087 RSI: 000000000000010f RDI: 000000000000000a [ 250.150287][ T6580] RBP: 00007fbca1306090 R08: 00000000000004bd R09: 0000000000000000 [ 250.158280][ T6580] R10: 0000200000000180 R11: 0000000000000246 R12: 0000000000000001 [ 250.166263][ T6580] R13: 0000000000000000 R14: 00007fbca2ec4fa0 R15: 00007ffe080e8aa8 [ 251.591271][ T6619] €Â0: renamed from pim6reg1 [ 252.878208][ T6650] device syzkaller0 entered promiscuous mode [ 252.929352][ T6655] €Â0: renamed from pim6reg1 [ 253.788990][ T6672] device pim6reg1 entered promiscuous mode [ 254.642130][ T6695] IPv6: ADDRCONF(NETDEV_CHANGE): syzkaller0: link becomes ready [ 254.913171][ T6688] device syzkaller0 entered promiscuous mode [ 255.027933][ T6708] device syzkaller0 entered promiscuous mode [ 255.166637][ C0] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 257.502671][ T6780] device pim6reg1 entered promiscuous mode [ 257.888780][ T6797] syz.4.2340[6797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.888879][ T6797] syz.4.2340[6797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 260.199058][ T24] audit: type=1400 audit(1750134205.020:147): avc: denied { create } for pid=6863 comm="syz.4.2364" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_scsitransport_socket permissive=1 [ 260.832298][ T6882] device syzkaller0 entered promiscuous mode [ 262.674210][ T6940] device syzkaller0 entered promiscuous mode [ 263.250602][ T6955] device syzkaller0 entered promiscuous mode [ 263.994463][ T6980] €Â0: renamed from pim6reg1 [ 264.650569][ T6993] device syzkaller0 entered promiscuous mode [ 267.379020][ T7040] device sit0 left promiscuous mode [ 267.568165][ T7041] device sit0 entered promiscuous mode [ 269.290223][ T7076] device veth0_vlan left promiscuous mode [ 269.323521][ T7076] device veth0_vlan entered promiscuous mode [ 269.441965][ T5566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 269.470425][ T5566] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 269.493340][ T5566] IPv6: ADDRCONF(NETDEV_CHANGE): ÿÿÿÿÿÿ: link becomes ready [ 272.757953][ T7141] device syzkaller0 entered promiscuous mode [ 272.810079][ T7159] device syzkaller0 entered promiscuous mode [ 272.817023][ T7158] device sit0 entered promiscuous mode [ 273.503534][ T7198] FAULT_INJECTION: forcing a failure. [ 273.503534][ T7198] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 273.566775][ T7198] CPU: 0 PID: 7198 Comm: syz.3.2489 Tainted: G W 5.10.238-syzkaller-00282-gd76d4cd0623a #0 [ 273.578095][ T7198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 273.588168][ T7198] Call Trace: [ 273.591526][ T7198] __dump_stack+0x21/0x24 [ 273.595885][ T7198] dump_stack_lvl+0x169/0x1d8 [ 273.600584][ T7198] ? show_regs_print_info+0x18/0x18 [ 273.605803][ T7198] dump_stack+0x15/0x1c [ 273.609969][ T7198] should_fail+0x3c1/0x510 [ 273.614435][ T7198] should_fail_usercopy+0x1a/0x20 [ 273.619487][ T7198] _copy_from_user+0x20/0xd0 [ 273.624090][ T7198] btf_new_fd+0x259/0xa00 [ 273.628429][ T7198] bpf_btf_load+0x5e/0x70 [ 273.632781][ T7198] __se_sys_bpf+0x48a/0x680 [ 273.637296][ T7198] ? __x64_sys_bpf+0x90/0x90 [ 273.641900][ T7198] ? fpu__clear_all+0x20/0x20 [ 273.646586][ T7198] __x64_sys_bpf+0x7b/0x90 [ 273.651011][ T7198] do_syscall_64+0x31/0x40 [ 273.655471][ T7198] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 273.661376][ T7198] RIP: 0033:0x7f3efd81c929 [ 273.665813][ T7198] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 273.685434][ T7198] RSP: 002b:00007f3efbe85038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 273.693858][ T7198] RAX: ffffffffffffffda RBX: 00007f3efda43fa0 RCX: 00007f3efd81c929 [ 273.701932][ T7198] RDX: 0000000000000028 RSI: 0000200000000480 RDI: 0000000000000012 [ 273.709913][ T7198] RBP: 00007f3efbe85090 R08: 0000000000000000 R09: 0000000000000000 [ 273.717892][ T7198] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 273.725875][ T7198] R13: 0000000000000000 R14: 00007f3efda43fa0 R15: 00007ffeef890028 [ 274.621306][ T7211] device syzkaller0 entered promiscuous mode