last executing test programs: 3.478901809s ago: executing program 2 (id=5013): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='pids.max\x00', 0x2, 0x0) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[@ANYBLOB='-0'], 0x9) syz_clone(0x4001000, 0x0, 0x0, &(0x7f0000000140), 0x0, 0x0) 3.441651202s ago: executing program 2 (id=5015): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b88f8ff00000000bfa200000000000007022000f8ffffffb703000022000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000030c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x2af, 0xe0c, 0xffe0, &(0x7f0000000640)="b9ff03076844268cb89e14f088a847fe884700121100632f77fbac14141dac1414", 0x0, 0x71, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 3.361663119s ago: executing program 3 (id=5016): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000040)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000080)=[0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x47, 0x0, 0x0, 0x10, &(0x7f0000000300), &(0x7f0000000380), 0x8, 0x46, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r1, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000c00)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000b80), &(0x7f0000000bc0)}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000cc0)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000c40), &(0x7f0000000c80)='%pi6 \x00'}, 0x20) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000d00)={0x1b, 0x0, 0x0, 0x1ff, 0x0, 0x1, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x4, 0x3}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000e00)={0x6, 0xd, &(0x7f00000004c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x8}, @map_val={0x18, 0xa}, @cb_func={0x18, 0xa, 0x4, 0x0, 0xffffffffffffffff}, @jmp={0x5, 0x1, 0x3, 0x2, 0x0, 0xfffffffffffffffb}, @cb_func={0x18, 0x0, 0x4, 0x0, 0x2}, @ringbuf_query, @call={0x85, 0x0, 0x0, 0x29}], &(0x7f0000000180)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0xd, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000580)={0x0, 0x8, 0x3ff, 0x1}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000d80)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r3, r4, r5, 0xffffffffffffffff], &(0x7f0000000dc0)=[{0x5, 0x1, 0x6}], 0x10, 0x8}, 0x90) r6 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) openat$tun(0xffffffffffffff9c, 0x0, 0x4000, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r9, &(0x7f0000000200)={&(0x7f0000000080), 0x10, 0x0}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r10 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r10, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) 3.320837862s ago: executing program 2 (id=5018): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040), 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x401c5820, &(0x7f0000000000)=0x8000) (async) write$cgroup_type(r4, &(0x7f0000000200), 0x9) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095", @ANYRESDEC=r1], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mm_page_free_batched\x00', r5}, 0x10) (async) close(r4) (async) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008180000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x401, 0x8, 0x1}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000ffff0018110000", @ANYRES64=r7, @ANYRES64=r2], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x89, 0x2, 0x0, 0x0, 0x2e, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) (async) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x22) 2.809985773s ago: executing program 3 (id=5023): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x4, 0x8, 0x8}, 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x34}, 0xeb) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_ext_load_extent\x00', r4}, 0x10) r6 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x14, &(0x7f00000001c0)='\x00'}, 0x11) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000bf080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r8}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 2.523501216s ago: executing program 3 (id=5026): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="ff009dbb57e0a66a00"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000080007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.371102688s ago: executing program 3 (id=5027): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xbc}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100), 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) ioctl$SIOCSIFHWADDR(r2, 0x401c5820, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'dvmrp1\x00', 0x2}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x1a, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x1, 0x8, 0x2, 0x5, 0x8, 0x8}, @ringbuf_query, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}, @jmp={0x5, 0x0, 0x1, 0x6, 0x8, 0x20, 0xfffffffffffffffb}, @map_idx_val={0x18, 0x7, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x334}, @snprintf, @map_val={0x18, 0x3, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @kfunc], &(0x7f0000000300)='syzkaller\x00', 0xca3, 0xec, &(0x7f0000000340)=""/236, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000480)={0x2, 0x1, 0xffffff03, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000004c0)=[r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, r2, 0xffffffffffffffff], &(0x7f0000000500)=[{0x4, 0x4, 0xc, 0x6}], 0x10, 0x1000}, 0x90) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0xa004}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 1.566866043s ago: executing program 3 (id=5033): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b7030000faffffff850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x1, 0x4, 0x8}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair(0x2a, 0x3, 0x340, &(0x7f00000002c0)) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xe, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x0, 0x0, 0x0, 0x0, 0x6c}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x4030582a, &(0x7f0000000040)) 1.225812591s ago: executing program 4 (id=5036): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000000000107b0af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x0, 0x0, 0x401}, 0x48) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) close(r3) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x11, 0x0, 0x0, &(0x7f0000000440)='syzkaller\x00', 0x0, 0xcb, &(0x7f0000000480)=""/203, 0x0, 0x6c, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000580)={0x4}, 0x8, 0x10, &(0x7f00000005c0)={0x2, 0x0, 0x6, 0x97}, 0x10, 0x0, 0x0, 0x1, &(0x7f0000000600)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000640)=[{0x0, 0x5, 0xc, 0x9}], 0x10, 0x20000}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000a00)={r4, 0xe0, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, &(0x7f0000000780)=[0x0, 0x0, 0x0], 0x0, 0x0, 0xb4, 0x0, 0x0, 0x10, &(0x7f0000000840), &(0x7f0000000880), 0x8, 0x0, 0x8, 0x0, 0x0}}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@bloom_filter={0x1e, 0x1c000, 0x8000, 0x7fff, 0x0, r6, 0x6, '\x00', r7, 0xffffffffffffffff, 0x1, 0x5, 0x2, 0x9}, 0x48) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x13, &(0x7f0000001440)=ANY=[@ANYRES16=r1, @ANYRES32=r2, @ANYRESDEC=r8], &(0x7f0000000400)='syzkaller\x00', 0xac3, 0xba, &(0x7f00000004c0)=""/186, 0x41100, 0x13, '\x00', r7, 0x0, r0, 0x8, &(0x7f0000000580)={0x6, 0x3}, 0x8, 0x10, &(0x7f00000005c0)={0x41, 0xe, 0x6, 0xae}, 0x10, 0x0, 0x0, 0xb, 0x0, &(0x7f00000015c0)=[{0x5, 0x1, 0x3, 0x1}, {0xfffffffd, 0x1, 0xf, 0x7}, {0x5, 0x3, 0xf, 0x1}, {0x5, 0x2, 0x10, 0xc}, {0x0, 0xfffffffe, 0xb, 0x4}, {0x2, 0x2, 0x2, 0xa}, {0x2, 0x5, 0x400005, 0xc}, {0x1, 0x4, 0x8, 0x6}, {0x0, 0x1, 0x5, 0x7}, {0x8, 0x5, 0x4, 0xa}, {0x4, 0x5, 0x7, 0x2}], 0x10, 0x81}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x3a0ffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="38000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bf"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(&(0x7f0000000140)='./cgroup\x00') bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9], 0x0, 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000980), 0x12) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000002000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002180)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) 1.179373954s ago: executing program 2 (id=5018): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040), 0x4) setsockopt$sock_attach_bpf(r3, 0x1, 0x3e, &(0x7f0000000040), 0x4) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x401c5820, &(0x7f0000000000)=0x8000) (async) write$cgroup_type(r4, &(0x7f0000000200), 0x9) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095", @ANYRESDEC=r1], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$ENABLE_STATS(0x20, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='mm_page_free_batched\x00', r5}, 0x10) (async) close(r4) (async) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r7 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000040)={'sit0\x00', @random="4f33e363a4b1"}) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000001000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008180000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x401, 0x8, 0x1}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000ffff0018110000", @ANYRES64=r7, @ANYRES64=r2], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x89, 0x2, 0x0, 0x0, 0x2e, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x1000, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x400000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r11) (async) recvmsg$unix(r10, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x22) 1.146237867s ago: executing program 4 (id=5037): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r2, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd55", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) (fail_nth: 12) 801.129035ms ago: executing program 2 (id=5038): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x4, 0x8, 0x8}, 0x48) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x34}, 0xeb) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='ext4_ext_load_extent\x00', r4}, 0x10) r6 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r6, r5, 0x0, 0x14, &(0x7f00000001c0)='\x00'}, 0x11) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000bf080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005800000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 800.655095ms ago: executing program 4 (id=5039): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa33"], 0xfdef) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, 0x0, 0xfdef) 800.452495ms ago: executing program 1 (id=5040): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="ff009dbb57e0a66a00"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000080007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 799.590125ms ago: executing program 0 (id=5022): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) close(r2) 774.783847ms ago: executing program 4 (id=5041): r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000100)=@framed={{0x18, 0x2}, [@call={0x85, 0x0, 0x0, 0xbc}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100), 0x48) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40305839, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) ioctl$SIOCSIFHWADDR(r2, 0x401c5820, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000080)={'dvmrp1\x00', 0x2}) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x1a, &(0x7f0000000200)=@raw=[@jmp={0x5, 0x1, 0x8, 0x2, 0x5, 0x8, 0x8}, @ringbuf_query, @map_val={0x18, 0x3, 0x2, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x6}, @jmp={0x5, 0x0, 0x1, 0x6, 0x8, 0x20, 0xfffffffffffffffb}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x334}, @snprintf, @map_val={0x18, 0x3, 0x2, 0x0, r2, 0x0, 0x0, 0x0, 0x5}, @kfunc], &(0x7f0000000300)='syzkaller\x00', 0xca3, 0xec, &(0x7f0000000340)=""/236, 0x40f00, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000440)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000480)={0x2, 0x1, 0xffffff03, 0x7}, 0x10, 0x0, 0x0, 0x1, &(0x7f00000004c0)=[r0, 0xffffffffffffffff, 0xffffffffffffffff, r1, 0xffffffffffffffff, r0, 0xffffffffffffffff, r2, 0xffffffffffffffff], &(0x7f0000000500)=[{0x4, 0x4, 0xc, 0x6}], 0x10, 0x1000}, 0x90) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0xa004}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x5452, &(0x7f00000006c0)='\x02;\xe5\b\x00\x1c\x9c\x00\x00\x00\x00\x00\x00\x91\xecB\xdcZ\xe5\xbd$\x05\x90\xa9\xf3\xc7\xcb\xb7\xf0\xa1;#\x989\xe9\x12\xdf^6T\xdf\xcd\x02\xc5\xb0\xba\x12\'QXp\t\xfc\xf3\x01\x02\xbc\xbf\xc0\xf0\x10\xee\xd3\\yy\xa4\xf9\xe8\x00\xdd\xe97 0_\xe4]W\xf7~\xacVK\xc9t\x9e+:\x85\xef\x94\x0e\x19\x9cV[N.\xeb\x9fJ>\xd9\x99\x88\xd8\xdd\xb8Y\xc3$\xc6\x93\v\x04REY\xf4\xea\xf2\xcd\xcd.\x16\x861\xa1\v\x8d\x8e\x84R\xa6\x83\x84\xc0\x01e\xc3\xc8\xcc?\xc8?\x19\xb2\xa2\xe1\xac<\xe9f\x11\xff3\xc7\x19\x9e\x19\xf5-\xfe\xbd\xae\xbbR\x82\x16\xf9\x15S\x03U\xe0\xd8t\xe3%96') openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 736.73705ms ago: executing program 1 (id=5042): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r1}, &(0x7f0000000080), 0x0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 714.095162ms ago: executing program 1 (id=5043): r0 = perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008088100b7040000000000008500000003"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='sys_enter\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r7, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000000), &(0x7f0000000180)='%ps \x00'}, 0x20) sendmsg(r7, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) close(r6) ioctl$PERF_EVENT_IOC_QUERY_BPF(r0, 0xc008240a, &(0x7f0000001b80)=ANY=[]) 703.450783ms ago: executing program 3 (id=5044): ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f00000015c0)='%+{\x00') r0 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0xb, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000570000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000010700000000000000000000181100", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x4, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000100), 0x10}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0xfffffffffffffdd2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)}, 0x2) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001340)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) r2 = openat$cgroup_ro(r1, 0x0, 0x0, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000600), 0x4) close(0xffffffffffffffff) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x13, 0x10, 0x2}, 0x48) openat$cgroup_ro(r2, &(0x7f0000000740)='devices.list\x00', 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xa, &(0x7f0000000680)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000000002f0000000000000018100000", @ANYRES32=r3, @ANYBLOB="000000000000000095000040950000700000f1ff00000000"], &(0x7f0000000000)='GPL\x00', 0x4, 0xee, &(0x7f0000000340)=""/238, 0x0, 0x0, '\x00', 0x0, 0x0, r0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000300)={r4, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000000c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000180)=[0x0], &(0x7f0000001540)=[0x0], 0x0, 0x8, &(0x7f0000000200), 0x0, 0x0, 0x0, &(0x7f0000000280), 0x8, 0x0, 0x8, 0x8, &(0x7f00000002c0)}}, 0x10) r6 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000005c0), 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001380)={r2, &(0x7f00000014c0)="0966f461530fb2b2a328301b66d219c1cf8aa195f461d93973f7902cd5a80104e89db1801c739d50d472de97681282688bf28a21b2c7893102e2490c8d25c6698a27e99a6554dbe2fb97b646de43ffe5913ed049"}, 0x20) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001440)={{}, &(0x7f00000013c0), &(0x7f0000001400)='%ps \x00'}, 0x20) setsockopt$sock_attach_bpf(r7, 0x1, 0xc, &(0x7f0000000200), 0x4) sendmsg$sock(r8, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x9, 0x9, &(0x7f0000000a40)=ANY=[@ANYBLOB="18009e8b631d57ec8816caa030e12e7d66040018b3d605", @ANYRES32=r3, @ANYBLOB="000000000000000018480000000000000000000000000000183a00000200000000000000000000000000000000000000cc5996e740971572c7d47da43298529b8b52fd3dfe8006e58a826e801ecb8d303dbb2b140548ef5e0a917d8b1c8c8747c88386907404b5509c1323b9d1461077a9d89beef3a7fc8333a4254a64db339a6ef082b24c3b97e0a5239c425a641485ab8e74fba0b27ac0f23ec1c956a5f136d83d6848ae02f7ea2577ce0f401a65afd003ebe05310982d626ebc98b26b0680353888b60f14fd898de873251b4248bae42c7bc96ee803529fe4759fc43bde76b320bbdbed5e880f128f9c523b3618122b76c48cf5f756a6b0638a2b41ee9a8dc82366369d4934c5266472deb02ba0af7f"], &(0x7f0000000200)='syzkaller\x00', 0x8, 0xec, &(0x7f0000000840)=""/236, 0x41000, 0x4, '\x00', 0x0, 0x1e, r6, 0x8, &(0x7f0000000c40)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000c80)={0x1, 0x9, 0xb590000, 0x200}, 0x10, r5}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x10, 0xe, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffff97, 0x10, &(0x7f00000000c0), 0xffffffffffffffc2}, 0x48) 671.215415ms ago: executing program 0 (id=5045): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x40086602, &(0x7f0000000540)={'\x00', @dev}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.current\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r3, &(0x7f0000000100), 0x1001) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r4}, 0x10) ioctl$SIOCSIFHWADDR(r3, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) write$cgroup_pid(r1, &(0x7f0000000000), 0xfdef) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=@base={0xc, 0x8, 0x68a, 0xb3, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r7, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000180)={r8, &(0x7f00000000c0), &(0x7f0000000100)=""/81}, 0x20) sendmsg$tipc(r6, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r10) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000b80)={{r11}, &(0x7f0000000980), &(0x7f0000000b40)}, 0x20) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r12}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(r9, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r13, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102031100fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 671.004485ms ago: executing program 0 (id=5046): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa10000000000000701000078ffffffb702000008000000b703000000000083850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000140)='qdisc_create\x00', r0}, 0x28) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 668.519136ms ago: executing program 2 (id=5047): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000088fe508a8500000004000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x7, 0xfff, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000000070200"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000bc0)={0xffffffffffffffff, &(0x7f0000000880)}, 0x20) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{r1}, &(0x7f0000000580), &(0x7f00000005c0)='%pi6 \x00'}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x8914, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) perf_event_open$cgroup(&(0x7f00000004c0)={0x4, 0x80, 0x2, 0x9, 0x28, 0xc, 0x0, 0x3, 0xd1324, 0xa, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x1, 0xf3}, 0x9000, 0x2, 0x6, 0x9, 0x7, 0x6, 0x0, 0x0, 0x7fffffff, 0x0, 0x8}, 0xffffffffffffffff, 0xce, r3, 0x5) syz_clone(0x500, &(0x7f0000000300)="01a9b69932a011fad92d00baacdf6c9cfa0ed766761fefa0a7c2ca7ffe664ab584efc83c681631c6843566ac4d7645bb7c812abf8d2b828d447ed215830ea417565a6a133d655c5661ef849948bbe196dae544002ea6736a9bb6f2cf420221c7fc0270050a983ab15e73e63875549b505f552fcb04b82f52d469f3821e49006a525d542bab3de1e031de498c9e40cd8f62bfa1b201c94f92d9cbd6d27f22f473208eb9eeab599aee6bfe55d10b0c", 0xae, &(0x7f0000000140), &(0x7f00000003c0), &(0x7f0000000400)="7f61574f63b8cd733ebf0ce60ef7c0fb1b368f32129dbf7f162b2d1d9ba426e698") r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r5}, 0x10) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 515.370258ms ago: executing program 1 (id=5048): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f0000000080)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000200)={0xffffffffffffffff, 0x58, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@bloom_filter={0x1e, 0x788, 0xbe, 0x101, 0x821, r0, 0x68, '\x00', r1, 0xffffffffffffffff, 0x3, 0x1, 0x3, 0xe}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x6, 0x1a, &(0x7f0000000340)=@raw=[@call={0x85, 0x0, 0x0, 0xd1}, @map_idx={0x18, 0x1, 0x5, 0x0, 0x12}, @generic={0x6, 0x8, 0x5, 0x6d, 0x5736}, @initr0={0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x200}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x9}}, @initr0={0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, @printk={@li, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xee}}, @alu={0x7, 0x1, 0x8, 0xa, 0x1, 0x28, 0xffffffffffffffff}, @call={0x85, 0x0, 0x0, 0xce}], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x74, &(0x7f0000000580)=""/116, 0x41100, 0x42, '\x00', r1, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000500)={0x3, 0x4}, 0x21, 0x10, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, &(0x7f0000000680)=[{0x3, 0x3, 0x8, 0xb}, {0x2, 0x5, 0x10}, {0x0, 0x3, 0xf, 0x2}, {0x5, 0x1, 0x9, 0x5}, {0x3, 0x3, 0x2, 0xc}, {0x3, 0x4, 0x3, 0x6}, {0x3, 0x1, 0x7, 0x9}, {0x5, 0x5, 0x1, 0x4}, {0x2, 0x3, 0x2}], 0x10, 0x123}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) write$cgroup_devices(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="1e030800935c8750aef06360864668f811"], 0xffdd) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=@framed={{}, [@printk={@p, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x71}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='pids.current\x00', 0x0, 0x0) openat$cgroup_procs(r7, &(0x7f0000000180)='tasks\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00'}, 0x10) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000600)={'pim6reg1\x00', 0x1000}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 515.096688ms ago: executing program 0 (id=5049): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000a00)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000900)={r2, 0x18000000000002a0, 0xe40, 0xa00, &(0x7f0000000040)="76389e147583ddd0569ba56a5cfd55", 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) 498.611279ms ago: executing program 0 (id=5050): bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1e, 0x1, 0x0, 0x1, 0x4028, r0, 0xb5, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x3}, 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.numa_stat\x00', 0x26e1, 0x0) close(r2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f00000055c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x42023, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x52c61100, 0x0, @perf_config_ext, 0x2040, 0x5, 0x0, 0x0, 0x686}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300)=@o_path={&(0x7f00000002c0)='./file0\x00', 0x0, 0x4000, r5}, 0x18) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000940)={r2, 0xe0, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, &(0x7f00000003c0)=[0x0, 0x0, 0x0], &(0x7f0000000440)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x8, &(0x7f0000000480)=[{}], 0x8, 0x10, &(0x7f00000004c0), &(0x7f0000000600), 0x8, 0x10, 0x8, 0xff12, &(0x7f0000000640)}}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001000)=@base={0x16, 0x6, 0x24d, 0x1000, 0x1000, r6, 0x8, '\x00', r7, 0xffffffffffffffff, 0x0, 0x2}, 0x48) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000000)={0x2, 0x4e21}, 0x10, 0x0, 0x0, &(0x7f0000001180)=[@ip_retopts={{0x14, 0x0, 0x7, {[@rr={0x7, 0x3}]}}}, @ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @local, @multicast2}}}], 0x38}, 0x4) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r9 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r10, &(0x7f0000000180), 0x40010) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], &(0x7f0000000280)='GPL\x00', 0x0, 0x8, &(0x7f0000000380)=""/8, 0x0, 0x0, '\x00', 0x0, 0x0, r9, 0x8, &(0x7f00000003c0)={0x2, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x90) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x100002, 0x0) r12 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='qdisc_dequeue\x00'}, 0x10) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000013c0)={0x18, 0x34, &(0x7f00000011c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xd81f}, {{0x18, 0x1, 0x1, 0x0, r12}}, {}, [@jmp={0x5, 0x1, 0x8, 0x8, 0x6, 0xffffffffffffffe0, 0x8}, @map_idx={0x18, 0xd, 0x5, 0x0, 0x2}, @ldst={0x2, 0x3, 0x1, 0x6, 0xa, 0x4, 0xfffffffffffffffc}, @printk={@d, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x926}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}}, @call={0x85, 0x0, 0x0, 0x3b}, @ldst={0x2, 0x3, 0x2, 0x6, 0x5, 0x80, 0xfffffffffffffff0}, @ldst={0x0, 0x3, 0x3, 0x0, 0x0, 0x20, 0x8}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x6}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000540)='syzkaller\x00', 0x6, 0x94, &(0x7f0000001080)=""/148, 0x41100, 0x2, '\x00', r7, 0x0, r11, 0x8, 0x0, 0x0, 0x10, &(0x7f00000005c0)={0x1, 0x5, 0x0, 0x5}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000001140)=[r1, r10, r0, r6, r10, r6, r0, r9], &(0x7f0000001380)=[{0x3, 0x3, 0x8, 0x6}, {0x2, 0x5, 0x5, 0x9}, {0x2, 0x3, 0x1, 0x1}, {0x1, 0x1, 0x10, 0x2}], 0x10, 0x6}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001480)={&(0x7f0000000400)='sys_enter\x00', r13}, 0x10) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r14, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="b9ff03076844268cb89e14f005dd1be0ffff00fe3a21632f77fbac14141de007031762079f4b4d2f87e5feca6aab845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x8, 0x60000000}, 0x1e) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000004018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 281.825807ms ago: executing program 0 (id=5051): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000180), 0x4bd) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xd}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414aa33"], 0xfdef) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, 0x0, 0xfdef) 209.631562ms ago: executing program 4 (id=5053): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x7}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r1}, &(0x7f0000000080), 0x0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000400)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 176.277845ms ago: executing program 1 (id=5054): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000002850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xb, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='hrtimer_init\x00', r4}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @random="0106002010ff"}) (fail_nth: 8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='fib_table_lookup\x00', r1}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x7}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair(0xa, 0x1, 0x0, &(0x7f0000000000)) 84.534943ms ago: executing program 1 (id=5055): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000001480)={'syzkaller0\x00', 0x7101}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r3, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) close(r2) 0s ago: executing program 4 (id=5056): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x102, 0x0) ioctl$TUNSETTXFILTER(r0, 0x400454d1, &(0x7f0000000040)={0x0, 0x4, [@random="172d03985710", @link_local, @broadcast, @local]}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x200600, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454d9, &(0x7f00000000c0)={'bond_slave_0\x00'}) ioctl$SIOCSIFHWADDR(r1, 0x8924, &(0x7f0000000100)={'bridge_slave_1\x00', @broadcast}) r2 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3, 0x6, 0x0, 0x9e, 0x0, 0x6, 0x40000, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x9, 0xffffffffffffffff}, 0x10000, 0xffff, 0x4, 0x1, 0x8, 0x4, 0x748, 0x0, 0x2, 0x0, 0x3}, 0xffffffffffffffff, 0xa, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000001c0)='\x00') bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000004c0)={0x1, 0x58, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000600)={&(0x7f0000000500)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x3, [@ptr={0xc, 0x0, 0x0, 0x2, 0x4}, @ptr={0xc, 0x0, 0x0, 0x2, 0x1}]}, {0x0, [0x0]}}, &(0x7f0000000540)=""/134, 0x33, 0x86, 0x1}, 0x20) r7 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f00000006c0), 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@bloom_filter={0x1e, 0x9, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0xe, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x5, 0xe}, 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000840)={{0x1, 0xffffffffffffffff}, &(0x7f00000007c0), &(0x7f0000000800)}, 0x20) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000880)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2}, 0x48) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x10, 0x7, &(0x7f00000002c0)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r3}}, @generic={0x8, 0x9, 0x6, 0x61}, @initr0={0x18, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x3}], &(0x7f0000000300)='GPL\x00', 0x4000000, 0xea, &(0x7f0000000340)=""/234, 0x41100, 0x1, '\x00', r5, 0x2e, r6, 0x8, &(0x7f0000000640)={0xa, 0x3}, 0x8, 0x10, &(0x7f0000000680)={0x10001, 0xd, 0xff4f, 0xc28}, 0x10, 0xffffffffffffffff, r7, 0x1, &(0x7f0000000900)=[r8, r9, r10, r11], &(0x7f0000000940)=[{0x1, 0x2, 0x3}], 0x10, 0x9}, 0x90) r13 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000001b40)=0xffffffffffffffff, 0x4) r14 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000001bc0)={r4, 0x7}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r10, 0xffffffffffffffff}, &(0x7f0000001c00), &(0x7f0000001c40)=r12}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000001d00)={0x6, 0x11, &(0x7f0000000a40)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xb9ae, 0x0, 0x0, 0x0, 0x1dc}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@map_idx={0x18, 0x1, 0x5, 0x0, 0x1}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000b00)='syzkaller\x00', 0x9, 0x1000, &(0x7f0000000b40)=""/4096, 0x41100, 0x5f, '\x00', 0x0, 0x25, r13, 0x8, &(0x7f0000001b80)={0x1, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001cc0)=[r8, r8, r14, r11, 0x1, r9, r10, r15, r9, r8], 0x0, 0x10, 0x469}, 0x90) write$cgroup_freezer_state(r10, &(0x7f0000001dc0)='THAWED\x00', 0x7) socketpair(0x2c, 0xa, 0xfffffff8, &(0x7f0000001e00)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r16, &(0x7f00000021c0)={&(0x7f0000001e40)=@nameseq={0x1e, 0x1, 0x0, {0x43, 0x3, 0x2}}, 0x10, &(0x7f0000002140)=[{&(0x7f0000001e80)="99d2402399465c23d9a3a76b5d1b3c9009356e1c023835f8df909232540da2537679aad7fc2dfcf90b00a67566b1d0deae70594374848964f6bfcd901c302cf4e6c80a18b2bcc0c7b9929664d5688756cad758b82a6214286aaab9c773280cf6e91e33d347f5472632f3e383f83fbd79d2a26c584faf16ef528e167d8cdfc73cc7dc967d5a27f81b6c6dcf36f9bf41fe5b0c63331d548cd2", 0x98}, {&(0x7f0000001f40)="836b6c0a434b0b23bdf4cb9f92ce99f930247225a95ddd7c75a2054387e7528d93f9afb8813c5a4d0f063d4a980c0159923f45d8ffb636a51e28788817cb6a9d9a02f721ba1a0a0962", 0x49}, {&(0x7f0000001fc0)="9be128", 0x3}, {&(0x7f0000002000)="b6d308c09578a2dc9cb5bf", 0xb}, {&(0x7f0000002040)="c55d34d031f4e4ff00", 0x9}, {&(0x7f0000002080)="f501bdb5a92aa78c21b86f4dab1c8ecdae3d3594f0dfcf2594b0cf5f31241c62da1a1ec2abf8e501ecb3e2e9d61dba04f1f911c497c6c7b8548dc657650324f5d90dc3b23898ad079544cac94343aa811c6d883238ad7f46c0701fe152916aa6085531075ca3373064a6a28125d9c83515c2f08393d866301740109948c0c37f1ee88170a86fe38d0e0be275e31911806e724d7ced2b7b4e49b2dd768800ada03b0b1d4d24f38999d8b52289e90f5310a3d75cc80e2f2c28107e1e280d", 0xbd}], 0x6, 0x0, 0x0, 0xc043}, 0x4) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000002240)={0x2, &(0x7f0000002200)=[{0x3, 0x6, 0x9, 0x1}, {0x0, 0x7, 0x2, 0xfaf8}]}) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000002280)) r17 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000003400)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x5, '\x00', r5, r0, 0x1, 0x5}, 0x48) r18 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000003480)={0x2, 0x4, 0x8, 0x1, 0x80, r3, 0xae, '\x00', 0x0, r6, 0x0, 0x1, 0x1}, 0x48) r19 = bpf$MAP_CREATE(0x0, &(0x7f0000003500)=@base={0x11, 0x1, 0x153, 0x2, 0x180, r14, 0xa013, '\x00', r5, r6, 0x4, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003640)={0x6, 0x10, &(0x7f00000022c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r8}}, {}, [@generic={0x93, 0x9, 0xa, 0x8001, 0x8001}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002340)='syzkaller\x00', 0x3, 0x1000, &(0x7f0000002380)=""/4096, 0x41100, 0x8, '\x00', r5, 0x25, r6, 0x8, &(0x7f0000003380)={0x0, 0x5}, 0x8, 0x10, &(0x7f00000033c0)={0x2, 0xc, 0xa}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000003580)=[r8, r17, r18, r9, r14, r14, r19], &(0x7f00000035c0)=[{0x3, 0x2, 0xa, 0x1}, {0x1, 0x5, 0x8, 0x6}, {0xa, 0x2, 0x4, 0x4}, {0x0, 0x5, 0x0, 0x2}, {0x1, 0x4, 0xa, 0x2}, {0x5, 0x4, 0x10, 0x5}, {0x4, 0x3, 0x3, 0x2}, {0x3, 0x3, 0x4, 0x1}], 0x10, 0x1000}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000003700)=@bloom_filter={0x1e, 0x2000000, 0x4d, 0x8, 0x2200, r15, 0xa87, '\x00', 0x0, r6, 0x0, 0x5, 0x5, 0x5}, 0x48) kernel console output (not intermixed with test programs): 00000001 [ 539.016873][T10667] R13: 000000000000000b R14: 00007fded9a0bf60 R15: 00007fff95e0cca8 [ 539.230957][T10671] device syzkaller0 entered promiscuous mode [ 539.705741][T10705] FAULT_INJECTION: forcing a failure. [ 539.705741][T10705] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 539.824857][T10705] CPU: 0 PID: 10705 Comm: syz.3.3953 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 539.836037][T10705] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 539.845931][T10705] Call Trace: [ 539.849060][T10705] dump_stack_lvl+0x1e2/0x24b [ 539.853575][T10705] ? bfq_pos_tree_add_move+0x43b/0x43b [ 539.858867][T10705] ? avc_has_perm+0x275/0x400 [ 539.863375][T10705] dump_stack+0x15/0x17 [ 539.867366][T10705] should_fail+0x3c6/0x510 [ 539.871639][T10705] should_fail_usercopy+0x1a/0x20 [ 539.876485][T10705] _copy_from_user+0x20/0xd0 [ 539.880913][T10705] sock_setsockopt+0x294/0x2e00 [ 539.885597][T10705] ? __sock_set_mark+0x160/0x160 [ 539.890371][T10705] ? selinux_socket_getsockopt+0x340/0x340 [ 539.896012][T10705] ? irqentry_exit+0x4f/0x60 [ 539.900442][T10705] ? security_socket_setsockopt+0x82/0xb0 [ 539.905999][T10705] __sys_setsockopt+0x441/0x870 [ 539.910680][T10705] ? __ia32_sys_recv+0xb0/0xb0 [ 539.915370][T10705] __x64_sys_setsockopt+0xbf/0xd0 [ 539.920227][T10705] do_syscall_64+0x34/0x70 [ 539.924481][T10705] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 539.930206][T10705] RIP: 0033:0x7f1464192bd9 [ 539.934459][T10705] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 539.953901][T10705] RSP: 002b:00007f1463414048 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 539.962146][T10705] RAX: ffffffffffffffda RBX: 00007f1464320f60 RCX: 00007f1464192bd9 [ 539.969955][T10705] RDX: 000000000000001d RSI: 0000000000000001 RDI: 0000000000000004 [ 539.977772][T10705] RBP: 00007f14634140a0 R08: 0000000000000004 R09: 0000000000000000 [ 539.985578][T10705] R10: 00000000200001c0 R11: 0000000000000246 R12: 0000000000000001 [ 539.993390][T10705] R13: 000000000000000b R14: 00007f1464320f60 R15: 00007ffda12d1788 [ 540.102629][T10714] device veth0_vlan left promiscuous mode [ 540.245770][T10714] device veth0_vlan entered promiscuous mode [ 541.487332][T10759] FAULT_INJECTION: forcing a failure. [ 541.487332][T10759] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 541.500615][T10759] CPU: 1 PID: 10759 Comm: syz.0.3974 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 541.511794][T10759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 541.521674][T10759] Call Trace: [ 541.524818][T10759] dump_stack_lvl+0x1e2/0x24b [ 541.529323][T10759] ? bfq_pos_tree_add_move+0x43b/0x43b [ 541.534615][T10759] ? do_vfs_ioctl+0x798/0x1a30 [ 541.539222][T10759] ? ioctl_has_perm+0x3f0/0x560 [ 541.543912][T10759] ? preempt_count_add+0x92/0x1a0 [ 541.548759][T10759] dump_stack+0x15/0x17 [ 541.552752][T10759] should_fail+0x3c6/0x510 [ 541.557005][T10759] should_fail_usercopy+0x1a/0x20 [ 541.561866][T10759] _copy_from_user+0x20/0xd0 [ 541.566293][T10759] __tun_chr_ioctl+0x265/0x2260 [ 541.570983][T10759] ? tun_flow_create+0x320/0x320 [ 541.575753][T10759] ? __fget_files+0x31e/0x380 [ 541.580271][T10759] tun_chr_ioctl+0x2a/0x40 [ 541.584514][T10759] ? tun_chr_poll+0x670/0x670 [ 541.589027][T10759] __se_sys_ioctl+0x114/0x190 [ 541.593552][T10759] __x64_sys_ioctl+0x7b/0x90 [ 541.597975][T10759] do_syscall_64+0x34/0x70 [ 541.602232][T10759] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 541.607954][T10759] RIP: 0033:0x7fded987dbd9 [ 541.612204][T10759] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 541.631646][T10759] RSP: 002b:00007fded8aff048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 541.639896][T10759] RAX: ffffffffffffffda RBX: 00007fded9a0bf60 RCX: 00007fded987dbd9 [ 541.647699][T10759] RDX: 00000000200000c0 RSI: 00000000400454ca RDI: 0000000000000006 [ 541.655508][T10759] RBP: 00007fded8aff0a0 R08: 0000000000000000 R09: 0000000000000000 [ 541.663318][T10759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 541.671130][T10759] R13: 000000000000000b R14: 00007fded9a0bf60 R15: 00007fff95e0cca8 [ 542.467216][T10813] FAULT_INJECTION: forcing a failure. [ 542.467216][T10813] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 542.492211][T10813] CPU: 1 PID: 10813 Comm: syz.2.3997 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 542.503390][T10813] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 542.513278][T10813] Call Trace: [ 542.516412][T10813] dump_stack_lvl+0x1e2/0x24b [ 542.520922][T10813] ? bfq_pos_tree_add_move+0x43b/0x43b [ 542.526339][T10813] ? 0xffffffffa0002a1c [ 542.530341][T10813] ? is_bpf_text_address+0x172/0x190 [ 542.535456][T10813] ? stack_trace_save+0x1c0/0x1c0 [ 542.540315][T10813] dump_stack+0x15/0x17 [ 542.544305][T10813] should_fail+0x3c6/0x510 [ 542.548560][T10813] should_fail_usercopy+0x1a/0x20 [ 542.553425][T10813] _copy_from_user+0x20/0xd0 [ 542.557852][T10813] __se_sys_bpf+0x232/0x11cb0 [ 542.562358][T10813] ? stack_trace_save+0x113/0x1c0 [ 542.567221][T10813] ? terminate_walk+0x407/0x4f0 [ 542.571910][T10813] ? stack_trace_snprint+0xf0/0xf0 [ 542.576869][T10813] ? kmem_cache_free+0xa9/0x1e0 [ 542.581545][T10813] ? kmem_cache_free+0xa9/0x1e0 [ 542.586229][T10813] ? kasan_set_track+0x5d/0x70 [ 542.590831][T10813] ? kasan_set_track+0x4b/0x70 [ 542.595431][T10813] ? kasan_set_free_info+0x23/0x40 [ 542.600378][T10813] ? ____kasan_slab_free+0x121/0x160 [ 542.605501][T10813] ? __kasan_slab_free+0x11/0x20 [ 542.610274][T10813] ? __x64_sys_bpf+0x90/0x90 [ 542.614694][T10813] ? do_sys_openat2+0x5e1/0x6f0 [ 542.619381][T10813] ? __x64_sys_openat+0x243/0x290 [ 542.624241][T10813] ? do_syscall_64+0x34/0x70 [ 542.628670][T10813] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 542.634574][T10813] ? _kstrtoull+0x3a0/0x4a0 [ 542.638917][T10813] ? kstrtouint_from_user+0x20a/0x2a0 [ 542.644118][T10813] ? kstrtol_from_user+0x310/0x310 [ 542.649070][T10813] ? memset+0x35/0x40 [ 542.652895][T10813] ? __fsnotify_parent+0x4b9/0x6c0 [ 542.657848][T10813] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 542.664431][T10813] ? proc_fail_nth_write+0x20b/0x290 [ 542.669553][T10813] ? proc_fail_nth_read+0x210/0x210 [ 542.674584][T10813] ? security_file_permission+0x86/0xb0 [ 542.679969][T10813] ? rw_verify_area+0x1c3/0x360 [ 542.684657][T10813] ? slab_free_freelist_hook+0xc0/0x190 [ 542.690032][T10813] ? preempt_count_add+0x92/0x1a0 [ 542.694891][T10813] ? vfs_write+0x854/0xe70 [ 542.699141][T10813] ? kernel_write+0x3d0/0x3d0 [ 542.703654][T10813] ? __kasan_check_write+0x14/0x20 [ 542.708600][T10813] ? mutex_lock+0xa5/0x110 [ 542.712854][T10813] ? mutex_trylock+0xa0/0xa0 [ 542.717281][T10813] ? __kasan_check_write+0x14/0x20 [ 542.722226][T10813] ? fput_many+0x160/0x1b0 [ 542.726486][T10813] ? debug_smp_processor_id+0x17/0x20 [ 542.731791][T10813] __x64_sys_bpf+0x7b/0x90 [ 542.736052][T10813] do_syscall_64+0x34/0x70 [ 542.740307][T10813] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 542.746038][T10813] RIP: 0033:0x7f7ee1f0bbd9 [ 542.750286][T10813] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 542.769818][T10813] RSP: 002b:00007f7ee116c048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 542.778060][T10813] RAX: ffffffffffffffda RBX: 00007f7ee209a038 RCX: 00007f7ee1f0bbd9 [ 542.785872][T10813] RDX: 0000000000000050 RSI: 0000000020000900 RDI: 000000000000000a [ 542.793692][T10813] RBP: 00007f7ee116c0a0 R08: 0000000000000000 R09: 0000000000000000 [ 542.801493][T10813] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 542.809305][T10813] R13: 000000000000006e R14: 00007f7ee209a038 R15: 00007ffeba9ab748 [ 543.043711][T10839] FAULT_INJECTION: forcing a failure. [ 543.043711][T10839] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 543.064418][T10839] CPU: 0 PID: 10839 Comm: syz.0.4007 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 543.075592][T10839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 543.085487][T10839] Call Trace: [ 543.088619][T10839] dump_stack_lvl+0x1e2/0x24b [ 543.093126][T10839] ? bfq_pos_tree_add_move+0x43b/0x43b [ 543.098418][T10839] ? 0xffffffffa0018000 [ 543.102414][T10839] ? is_bpf_text_address+0x172/0x190 [ 543.107532][T10839] ? stack_trace_save+0x1c0/0x1c0 [ 543.112391][T10839] dump_stack+0x15/0x17 [ 543.116385][T10839] should_fail+0x3c6/0x510 [ 543.120635][T10839] should_fail_usercopy+0x1a/0x20 [ 543.125502][T10839] _copy_from_user+0x20/0xd0 [ 543.129922][T10839] __se_sys_bpf+0x232/0x11cb0 [ 543.134456][T10839] ? stack_trace_save+0x113/0x1c0 [ 543.139385][T10839] ? terminate_walk+0x407/0x4f0 [ 543.144071][T10839] ? stack_trace_snprint+0xf0/0xf0 [ 543.149024][T10839] ? kmem_cache_free+0xa9/0x1e0 [ 543.153791][T10839] ? kmem_cache_free+0xa9/0x1e0 [ 543.158492][T10839] ? kasan_set_track+0x5d/0x70 [ 543.163087][T10839] ? kasan_set_track+0x4b/0x70 [ 543.167775][T10839] ? kasan_set_free_info+0x23/0x40 [ 543.172714][T10839] ? ____kasan_slab_free+0x121/0x160 [ 543.177836][T10839] ? __kasan_slab_free+0x11/0x20 [ 543.182615][T10839] ? __x64_sys_bpf+0x90/0x90 [ 543.187033][T10839] ? do_sys_openat2+0x5e1/0x6f0 [ 543.191719][T10839] ? __x64_sys_openat+0x243/0x290 [ 543.196592][T10839] ? do_syscall_64+0x34/0x70 [ 543.201024][T10839] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 543.206917][T10839] ? _kstrtoull+0x3a0/0x4a0 [ 543.211251][T10839] ? kstrtouint_from_user+0x20a/0x2a0 [ 543.216462][T10839] ? kstrtol_from_user+0x310/0x310 [ 543.221408][T10839] ? memset+0x35/0x40 [ 543.225222][T10839] ? __fsnotify_parent+0x4b9/0x6c0 [ 543.230178][T10839] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 543.236773][T10839] ? proc_fail_nth_write+0x20b/0x290 [ 543.241885][T10839] ? proc_fail_nth_read+0x210/0x210 [ 543.246925][T10839] ? security_file_permission+0x86/0xb0 [ 543.252302][T10839] ? rw_verify_area+0x1c3/0x360 [ 543.256993][T10839] ? slab_free_freelist_hook+0xc0/0x190 [ 543.262370][T10839] ? preempt_count_add+0x92/0x1a0 [ 543.267231][T10839] ? vfs_write+0x854/0xe70 [ 543.271484][T10839] ? kernel_write+0x3d0/0x3d0 [ 543.275995][T10839] ? __kasan_check_write+0x14/0x20 [ 543.280946][T10839] ? mutex_lock+0xa5/0x110 [ 543.285196][T10839] ? mutex_trylock+0xa0/0xa0 [ 543.289626][T10839] ? __kasan_check_write+0x14/0x20 [ 543.294571][T10839] ? fput_many+0x160/0x1b0 [ 543.298829][T10839] ? debug_smp_processor_id+0x17/0x20 [ 543.304030][T10839] __x64_sys_bpf+0x7b/0x90 [ 543.308286][T10839] do_syscall_64+0x34/0x70 [ 543.312539][T10839] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 543.318266][T10839] RIP: 0033:0x7fded987dbd9 [ 543.322522][T10839] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 543.341964][T10839] RSP: 002b:00007fded8aff048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 543.350211][T10839] RAX: ffffffffffffffda RBX: 00007fded9a0bf60 RCX: 00007fded987dbd9 [ 543.358015][T10839] RDX: 0000000000000020 RSI: 00000000200002c0 RDI: 0000000000000001 [ 543.365827][T10839] RBP: 00007fded8aff0a0 R08: 0000000000000000 R09: 0000000000000000 [ 543.373642][T10839] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 543.381453][T10839] R13: 000000000000000b R14: 00007fded9a0bf60 R15: 00007fff95e0cca8 [ 544.615454][T10871] bridge0: port 1(bridge_slave_0) entered blocking state [ 544.624909][T10871] bridge0: port 1(bridge_slave_0) entered disabled state [ 544.632580][T10871] device bridge_slave_0 entered promiscuous mode [ 544.753872][T10871] bridge0: port 2(bridge_slave_1) entered blocking state [ 544.760795][T10871] bridge0: port 2(bridge_slave_1) entered disabled state [ 544.768314][T10871] device bridge_slave_1 entered promiscuous mode [ 544.815754][T10871] bridge0: port 2(bridge_slave_1) entered blocking state [ 544.822633][T10871] bridge0: port 2(bridge_slave_1) entered forwarding state [ 544.829726][T10871] bridge0: port 1(bridge_slave_0) entered blocking state [ 544.836486][T10871] bridge0: port 1(bridge_slave_0) entered forwarding state [ 544.978195][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 544.985660][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 544.994128][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 545.027177][ T6184] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 545.039934][ T6184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 545.049610][ T6184] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 545.062572][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 545.071435][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 545.078666][ T5] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 545.087336][T10871] device veth0_vlan entered promiscuous mode [ 545.103380][T10871] device veth1_macvtap entered promiscuous mode [ 545.110321][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 545.128955][ T6182] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 545.149142][ T6182] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 545.157650][ T6182] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 545.167363][ T6182] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 545.919847][T10922] FAULT_INJECTION: forcing a failure. [ 545.919847][T10922] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 545.945646][T10927] device pim6reg1 entered promiscuous mode [ 545.976857][T10922] CPU: 1 PID: 10922 Comm: syz.0.4039 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 545.988036][T10922] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 545.997928][T10922] Call Trace: [ 546.001061][T10922] dump_stack_lvl+0x1e2/0x24b [ 546.005571][T10922] ? bfq_pos_tree_add_move+0x43b/0x43b [ 546.010858][T10922] ? 0xffffffffa0018000 [ 546.014851][T10922] ? is_bpf_text_address+0x172/0x190 [ 546.019969][T10922] ? stack_trace_save+0x1c0/0x1c0 [ 546.024826][T10922] dump_stack+0x15/0x17 [ 546.028824][T10922] should_fail+0x3c6/0x510 [ 546.033073][T10922] should_fail_usercopy+0x1a/0x20 [ 546.037938][T10922] _copy_from_user+0x20/0xd0 [ 546.042375][T10922] __se_sys_bpf+0x232/0x11cb0 [ 546.046880][T10922] ? stack_trace_save+0x113/0x1c0 [ 546.051740][T10922] ? terminate_walk+0x407/0x4f0 [ 546.056422][T10922] ? stack_trace_snprint+0xf0/0xf0 [ 546.061370][T10922] ? kmem_cache_free+0xa9/0x1e0 [ 546.066055][T10922] ? kmem_cache_free+0xa9/0x1e0 [ 546.070743][T10922] ? kasan_set_track+0x5d/0x70 [ 546.075774][T10922] ? kasan_set_track+0x4b/0x70 [ 546.080377][T10922] ? kasan_set_free_info+0x23/0x40 [ 546.085328][T10922] ? ____kasan_slab_free+0x121/0x160 [ 546.090442][T10922] ? __kasan_slab_free+0x11/0x20 [ 546.095217][T10922] ? __x64_sys_bpf+0x90/0x90 [ 546.099645][T10922] ? do_sys_openat2+0x5e1/0x6f0 [ 546.104330][T10922] ? __x64_sys_openat+0x243/0x290 [ 546.109189][T10922] ? do_syscall_64+0x34/0x70 [ 546.113619][T10922] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 546.119523][T10922] ? _kstrtoull+0x3a0/0x4a0 [ 546.123861][T10922] ? kstrtouint_from_user+0x20a/0x2a0 [ 546.129068][T10922] ? kstrtol_from_user+0x310/0x310 [ 546.134014][T10922] ? memset+0x35/0x40 [ 546.137836][T10922] ? __fsnotify_parent+0x4b9/0x6c0 [ 546.142782][T10922] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 546.149380][T10922] ? proc_fail_nth_write+0x20b/0x290 [ 546.154498][T10922] ? proc_fail_nth_read+0x210/0x210 [ 546.159538][T10922] ? security_file_permission+0x86/0xb0 [ 546.164919][T10922] ? rw_verify_area+0x1c3/0x360 [ 546.169601][T10922] ? slab_free_freelist_hook+0xc0/0x190 [ 546.174983][T10922] ? preempt_count_add+0x92/0x1a0 [ 546.179839][T10922] ? vfs_write+0x854/0xe70 [ 546.184097][T10922] ? kernel_write+0x3d0/0x3d0 [ 546.188609][T10922] ? __kasan_check_write+0x14/0x20 [ 546.193555][T10922] ? mutex_lock+0xa5/0x110 [ 546.197806][T10922] ? mutex_trylock+0xa0/0xa0 [ 546.202234][T10922] ? __kasan_check_write+0x14/0x20 [ 546.207181][T10922] ? fput_many+0x160/0x1b0 [ 546.211442][T10922] ? debug_smp_processor_id+0x17/0x20 [ 546.216641][T10922] __x64_sys_bpf+0x7b/0x90 [ 546.220897][T10922] do_syscall_64+0x34/0x70 [ 546.225148][T10922] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 546.230875][T10922] RIP: 0033:0x7fded987dbd9 [ 546.235132][T10922] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 546.254661][T10922] RSP: 002b:00007fded8aff048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 546.262903][T10922] RAX: ffffffffffffffda RBX: 00007fded9a0bf60 RCX: 00007fded987dbd9 [ 546.270712][T10922] RDX: 000000000000002c RSI: 0000000020000080 RDI: 000000000000000a [ 546.278523][T10922] RBP: 00007fded8aff0a0 R08: 0000000000000000 R09: 0000000000000000 [ 546.286457][T10922] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 546.294268][T10922] R13: 000000000000000b R14: 00007fded9a0bf60 R15: 00007fff95e0cca8 [ 546.609892][T10956] device syzkaller0 entered promiscuous mode [ 546.664648][ T8231] device bridge_slave_1 left promiscuous mode [ 546.670743][ T8231] bridge0: port 2(bridge_slave_1) entered disabled state [ 546.702128][ T8231] device bridge_slave_0 left promiscuous mode [ 546.732546][ T8231] bridge0: port 1(bridge_slave_0) entered disabled state [ 546.743575][ T8231] device veth1_macvtap left promiscuous mode [ 546.749453][ T8231] device veth0_vlan left promiscuous mode [ 547.292579][T11017] device pim6reg1 entered promiscuous mode [ 547.520872][T11034] FAULT_INJECTION: forcing a failure. [ 547.520872][T11034] name failslab, interval 1, probability 0, space 0, times 0 [ 547.533342][T11034] CPU: 0 PID: 11034 Comm: syz.1.4085 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 547.544547][T11034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 547.554526][T11034] Call Trace: [ 547.557679][T11034] dump_stack_lvl+0x1e2/0x24b [ 547.562172][T11034] ? bfq_pos_tree_add_move+0x43b/0x43b [ 547.567466][T11034] ? 0xffffffffa0018000 [ 547.571458][T11034] ? is_bpf_text_address+0x172/0x190 [ 547.576572][T11034] dump_stack+0x15/0x17 [ 547.580566][T11034] should_fail+0x3c6/0x510 [ 547.584823][T11034] ? __alloc_skb+0x80/0x510 [ 547.589165][T11034] __should_failslab+0xa4/0xe0 [ 547.593767][T11034] should_failslab+0x9/0x20 [ 547.598102][T11034] kmem_cache_alloc+0x3d/0x2e0 [ 547.602699][T11034] __alloc_skb+0x80/0x510 [ 547.606864][T11034] ? __kasan_check_write+0x14/0x20 [ 547.611810][T11034] __napi_alloc_skb+0x15d/0x2e0 [ 547.616503][T11034] napi_get_frags+0x6a/0x170 [ 547.620927][T11034] tun_get_user+0xc88/0x38f0 [ 547.625352][T11034] ? kasan_set_track+0x4b/0x70 [ 547.629951][T11034] ? kasan_set_free_info+0x23/0x40 [ 547.634901][T11034] ? slab_free_freelist_hook+0xc0/0x190 [ 547.640283][T11034] ? do_syscall_64+0x34/0x70 [ 547.644707][T11034] ? _kstrtoull+0x3a0/0x4a0 [ 547.649050][T11034] ? tun_do_read+0x1f60/0x1f60 [ 547.653645][T11034] ? kstrtouint_from_user+0x20a/0x2a0 [ 547.658858][T11034] ? kstrtol_from_user+0x310/0x310 [ 547.663894][T11034] ? avc_policy_seqno+0x1b/0x70 [ 547.668579][T11034] ? selinux_file_permission+0x2bb/0x560 [ 547.674044][T11034] ? fsnotify_perm+0x67/0x4e0 [ 547.678564][T11034] tun_chr_write_iter+0x1a8/0x250 [ 547.683423][T11034] vfs_write+0xb55/0xe70 [ 547.687503][T11034] ? kernel_write+0x3d0/0x3d0 [ 547.692014][T11034] ? __fdget_pos+0x209/0x3a0 [ 547.696440][T11034] ? ksys_write+0x77/0x2c0 [ 547.700690][T11034] ksys_write+0x199/0x2c0 [ 547.704857][T11034] ? __ia32_sys_read+0x90/0x90 [ 547.709460][T11034] ? debug_smp_processor_id+0x17/0x20 [ 547.714664][T11034] __x64_sys_write+0x7b/0x90 [ 547.719089][T11034] do_syscall_64+0x34/0x70 [ 547.723346][T11034] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 547.729068][T11034] RIP: 0033:0x7fd4cfac0bd9 [ 547.733324][T11034] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 547.752768][T11034] RSP: 002b:00007fd4ced42048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 547.761008][T11034] RAX: ffffffffffffffda RBX: 00007fd4cfc4ef60 RCX: 00007fd4cfac0bd9 [ 547.768818][T11034] RDX: 000000000000fdef RSI: 0000000000000000 RDI: 0000000000000003 [ 547.776631][T11034] RBP: 00007fd4ced420a0 R08: 0000000000000000 R09: 0000000000000000 [ 547.784447][T11034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 547.792257][T11034] R13: 000000000000000b R14: 00007fd4cfc4ef60 R15: 00007ffe30e82ec8 [ 547.807564][T11035] syz.0.4084[11035] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 547.807618][T11035] syz.0.4084[11035] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 548.060333][T11061] device pim6reg1 entered promiscuous mode [ 548.118768][T11066] FAULT_INJECTION: forcing a failure. [ 548.118768][T11066] name failslab, interval 1, probability 0, space 0, times 0 [ 548.137978][T11066] CPU: 0 PID: 11066 Comm: syz.3.4097 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 548.149203][T11066] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 548.159058][T11066] Call Trace: [ 548.162188][T11066] dump_stack_lvl+0x1e2/0x24b [ 548.166694][T11066] ? panic+0x812/0x812 [ 548.170598][T11066] ? bfq_pos_tree_add_move+0x43b/0x43b [ 548.175890][T11066] dump_stack+0x15/0x17 [ 548.179884][T11066] should_fail+0x3c6/0x510 [ 548.184137][T11066] ? __alloc_skb+0x80/0x510 [ 548.188488][T11066] __should_failslab+0xa4/0xe0 [ 548.193077][T11066] should_failslab+0x9/0x20 [ 548.197416][T11066] kmem_cache_alloc+0x3d/0x2e0 [ 548.202016][T11066] __alloc_skb+0x80/0x510 [ 548.206183][T11066] alloc_skb_with_frags+0xa1/0x570 [ 548.211131][T11066] ? 0xffffffffa0018000 [ 548.215135][T11066] ? is_bpf_text_address+0x172/0x190 [ 548.220254][T11066] ? stack_trace_save+0x1c0/0x1c0 [ 548.225104][T11066] sock_alloc_send_pskb+0x915/0xa50 [ 548.230141][T11066] ? sock_kzfree_s+0x60/0x60 [ 548.234587][T11066] ? stack_trace_snprint+0xf0/0xf0 [ 548.239513][T11066] tun_get_user+0xe90/0x38f0 [ 548.243937][T11066] ? kasan_set_track+0x4b/0x70 [ 548.248552][T11066] ? kasan_set_free_info+0x23/0x40 [ 548.253487][T11066] ? do_syscall_64+0x34/0x70 [ 548.257918][T11066] ? _kstrtoull+0x3a0/0x4a0 [ 548.262252][T11066] ? tun_do_read+0x1f60/0x1f60 [ 548.266849][T11066] ? kstrtouint_from_user+0x20a/0x2a0 [ 548.272724][T11066] ? kstrtol_from_user+0x310/0x310 [ 548.277661][T11066] ? putname+0xe7/0x140 [ 548.281645][T11066] ? avc_policy_seqno+0x1b/0x70 [ 548.286334][T11066] ? selinux_file_permission+0x2bb/0x560 [ 548.291802][T11066] ? fsnotify_perm+0x67/0x4e0 [ 548.296314][T11066] tun_chr_write_iter+0x1a8/0x250 [ 548.301173][T11066] vfs_write+0xb55/0xe70 [ 548.305250][T11066] ? kernel_write+0x3d0/0x3d0 [ 548.309766][T11066] ? __fdget_pos+0x209/0x3a0 [ 548.314184][T11066] ? ksys_write+0x77/0x2c0 [ 548.318438][T11066] ksys_write+0x199/0x2c0 [ 548.322606][T11066] ? bpf_trace_run1+0x210/0x210 [ 548.327295][T11066] ? __ia32_sys_read+0x90/0x90 [ 548.331895][T11066] ? __bpf_trace_sys_enter+0x62/0x70 [ 548.337015][T11066] __x64_sys_write+0x7b/0x90 [ 548.341443][T11066] do_syscall_64+0x34/0x70 [ 548.345696][T11066] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 548.351422][T11066] RIP: 0033:0x7f1464192bd9 [ 548.355677][T11066] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 548.375116][T11066] RSP: 002b:00007f1463414048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 548.383362][T11066] RAX: ffffffffffffffda RBX: 00007f1464320f60 RCX: 00007f1464192bd9 [ 548.391171][T11066] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 548.398981][T11066] RBP: 00007f14634140a0 R08: 0000000000000000 R09: 0000000000000000 [ 548.406793][T11066] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 548.414604][T11066] R13: 000000000000000b R14: 00007f1464320f60 R15: 00007ffda12d1788 [ 548.607723][T11088] FAULT_INJECTION: forcing a failure. [ 548.607723][T11088] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 548.780310][T11088] CPU: 1 PID: 11088 Comm: syz.0.4107 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 548.791484][T11088] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 548.801375][T11088] Call Trace: [ 548.804508][T11088] dump_stack_lvl+0x1e2/0x24b [ 548.809021][T11088] ? bfq_pos_tree_add_move+0x43b/0x43b [ 548.814312][T11088] ? 0xffffffffa0018000 [ 548.818303][T11088] ? is_bpf_text_address+0x172/0x190 [ 548.823426][T11088] ? stack_trace_save+0x1c0/0x1c0 [ 548.828289][T11088] dump_stack+0x15/0x17 [ 548.832276][T11088] should_fail+0x3c6/0x510 [ 548.836528][T11088] should_fail_usercopy+0x1a/0x20 [ 548.841388][T11088] _copy_from_iter_full+0x1ef/0xa20 [ 548.846437][T11088] ? stack_trace_save+0x113/0x1c0 [ 548.851290][T11088] ? terminate_walk+0x407/0x4f0 [ 548.855975][T11088] ? copyin+0x90/0x90 [ 548.859794][T11088] tun_get_user+0x47a/0x38f0 [ 548.864214][T11088] ? kasan_set_track+0x4b/0x70 [ 548.868815][T11088] ? do_syscall_64+0x34/0x70 [ 548.873243][T11088] ? _kstrtoull+0x3a0/0x4a0 [ 548.877587][T11088] ? tun_do_read+0x1f60/0x1f60 [ 548.882184][T11088] ? kstrtouint_from_user+0x20a/0x2a0 [ 548.887392][T11088] ? kstrtol_from_user+0x310/0x310 [ 548.892341][T11088] ? avc_policy_seqno+0x1b/0x70 [ 548.897025][T11088] ? selinux_file_permission+0x2bb/0x560 [ 548.902491][T11088] ? fsnotify_perm+0x67/0x4e0 [ 548.907004][T11088] tun_chr_write_iter+0x1a8/0x250 [ 548.911869][T11088] vfs_write+0xb55/0xe70 [ 548.915946][T11088] ? kernel_write+0x3d0/0x3d0 [ 548.920463][T11088] ? __fdget_pos+0x209/0x3a0 [ 548.924884][T11088] ? ksys_write+0x77/0x2c0 [ 548.929137][T11088] ksys_write+0x199/0x2c0 [ 548.933309][T11088] ? __ia32_sys_read+0x90/0x90 [ 548.937906][T11088] ? debug_smp_processor_id+0x17/0x20 [ 548.943116][T11088] __x64_sys_write+0x7b/0x90 [ 548.947538][T11088] do_syscall_64+0x34/0x70 [ 548.951790][T11088] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 548.957519][T11088] RIP: 0033:0x7fded987dbd9 [ 548.961770][T11088] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 548.981212][T11088] RSP: 002b:00007fded8aff048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 548.989459][T11088] RAX: ffffffffffffffda RBX: 00007fded9a0bf60 RCX: 00007fded987dbd9 [ 548.997267][T11088] RDX: 0000000000000010 RSI: 0000000020000140 RDI: 0000000000000006 [ 549.005077][T11088] RBP: 00007fded8aff0a0 R08: 0000000000000000 R09: 0000000000000000 [ 549.012892][T11088] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 549.020704][T11088] R13: 000000000000000b R14: 00007fded9a0bf60 R15: 00007fff95e0cca8 [ 549.866826][T11112] tap0: tun_chr_ioctl cmd 1074025675 [ 549.872014][T11112] tap0: persist enabled [ 551.130305][T11189] FAULT_INJECTION: forcing a failure. [ 551.130305][T11189] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 551.158719][T11189] CPU: 1 PID: 11189 Comm: syz.0.4144 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 551.169894][T11189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 551.179785][T11189] Call Trace: [ 551.182916][T11189] dump_stack_lvl+0x1e2/0x24b [ 551.187440][T11189] ? bfq_pos_tree_add_move+0x43b/0x43b [ 551.192811][T11189] ? clockevents_program_event+0x214/0x2c0 [ 551.198448][T11189] dump_stack+0x15/0x17 [ 551.202438][T11189] should_fail+0x3c6/0x510 [ 551.206691][T11189] should_fail_alloc_page+0x52/0x60 [ 551.211725][T11189] __alloc_pages_nodemask+0x1b3/0xaf0 [ 551.216935][T11189] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 551.222314][T11189] ? ctx_flexible_sched_in+0xa8/0x100 [ 551.227523][T11189] ? ctx_pinned_sched_in+0x100/0x100 [ 551.232644][T11189] ? sched_clock_cpu+0x1b/0x3b0 [ 551.237330][T11189] ? _raw_spin_lock+0xa4/0x1b0 [ 551.241941][T11189] ? avc_has_perm_noaudit+0x117/0x240 [ 551.247137][T11189] shmem_alloc_page+0x257/0x420 [ 551.251825][T11189] ? put_page+0xd0/0xd0 [ 551.255822][T11189] ? percpu_counter_add_batch+0x13d/0x160 [ 551.261379][T11189] shmem_alloc_and_acct_page+0x395/0x8e0 [ 551.266841][T11189] ? shmem_swapin_page+0x1950/0x1950 [ 551.271975][T11189] ? __kasan_check_read+0x11/0x20 [ 551.276818][T11189] ? preempt_schedule_irq+0xe7/0x140 [ 551.281941][T11189] ? preempt_schedule_notrace+0x140/0x140 [ 551.287505][T11189] ? __irq_exit_rcu+0x40/0x150 [ 551.292097][T11189] ? irqentry_exit+0x4f/0x60 [ 551.296526][T11189] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 551.302178][T11189] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 551.308154][T11189] ? find_get_entry+0x163/0x4c0 [ 551.312843][T11189] shmem_getpage_gfp+0x891/0x2480 [ 551.317700][T11189] ? kvm_sched_clock_read+0x18/0x40 [ 551.322740][T11189] ? shmem_getpage+0xa0/0xa0 [ 551.327160][T11189] shmem_write_begin+0xca/0x1b0 [ 551.331852][T11189] generic_perform_write+0x2cd/0x570 [ 551.336971][T11189] ? grab_cache_page_write_begin+0xa0/0xa0 [ 551.342608][T11189] ? file_remove_privs+0x570/0x570 [ 551.347645][T11189] ? __kasan_check_write+0x14/0x20 [ 551.352589][T11189] __generic_file_write_iter+0x23c/0x560 [ 551.358059][T11189] ? generic_write_checks+0x3b9/0x470 [ 551.363267][T11189] generic_file_write_iter+0xaf/0x1c0 [ 551.368480][T11189] vfs_write+0xb55/0xe70 [ 551.372556][T11189] ? kernel_write+0x3d0/0x3d0 [ 551.377070][T11189] ? mutex_trylock+0xa0/0xa0 [ 551.381494][T11189] ? __fdget_pos+0x2e7/0x3a0 [ 551.385915][T11189] ? ksys_write+0x77/0x2c0 [ 551.390260][T11189] ksys_write+0x199/0x2c0 [ 551.394428][T11189] ? __kasan_check_write+0x14/0x20 [ 551.399372][T11189] ? __ia32_sys_read+0x90/0x90 [ 551.403975][T11189] ? __kasan_check_read+0x11/0x20 [ 551.408969][T11189] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 551.414868][T11189] __x64_sys_write+0x7b/0x90 [ 551.419281][T11189] do_syscall_64+0x34/0x70 [ 551.423618][T11189] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 551.429344][T11189] RIP: 0033:0x7fded987dbd9 [ 551.433599][T11189] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 551.453041][T11189] RSP: 002b:00007fded8aff048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 551.461282][T11189] RAX: ffffffffffffffda RBX: 00007fded9a0bf60 RCX: 00007fded987dbd9 [ 551.469093][T11189] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000004 [ 551.476903][T11189] RBP: 00007fded8aff0a0 R08: 0000000000000000 R09: 0000000000000000 [ 551.484715][T11189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 551.492530][T11189] R13: 000000000000000b R14: 00007fded9a0bf60 R15: 00007fff95e0cca8 [ 552.990961][T11250] FAULT_INJECTION: forcing a failure. [ 552.990961][T11250] name failslab, interval 1, probability 0, space 0, times 0 [ 553.016846][T11250] CPU: 0 PID: 11250 Comm: syz.3.4167 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 553.028117][T11250] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 553.037999][T11250] Call Trace: [ 553.041132][T11250] dump_stack_lvl+0x1e2/0x24b [ 553.045644][T11250] ? panic+0x812/0x812 [ 553.049549][T11250] ? bfq_pos_tree_add_move+0x43b/0x43b [ 553.054857][T11250] dump_stack+0x15/0x17 [ 553.058836][T11250] should_fail+0x3c6/0x510 [ 553.063351][T11250] ? __alloc_skb+0x80/0x510 [ 553.067743][T11250] __should_failslab+0xa4/0xe0 [ 553.072288][T11250] should_failslab+0x9/0x20 [ 553.076628][T11250] kmem_cache_alloc+0x3d/0x2e0 [ 553.081234][T11250] __alloc_skb+0x80/0x510 [ 553.085393][T11250] ? inetdev_event+0x777/0x1040 [ 553.090081][T11250] inet_netconf_notify_devconf+0x173/0x220 [ 553.095723][T11250] inetdev_event+0x798/0x1040 [ 553.100234][T11250] ? ipv4_doint_and_flush+0x150/0x150 [ 553.105444][T11250] ? __kasan_check_write+0x14/0x20 [ 553.110394][T11250] raw_notifier_call_chain+0x8c/0xf0 [ 553.115514][T11250] unregister_netdevice_many+0xde7/0x17d0 [ 553.121069][T11250] ? io_schedule+0x120/0x120 [ 553.125491][T11250] ? alloc_netdev_mqs+0xcd0/0xcd0 [ 553.130355][T11250] ? add_timer+0x68/0x80 [ 553.134436][T11250] ? __queue_delayed_work+0x16d/0x1f0 [ 553.139645][T11250] ? __kasan_check_read+0x11/0x20 [ 553.144503][T11250] unregister_netdevice_queue+0x2e6/0x350 [ 553.150060][T11250] ? linkwatch_urgent_event+0x65/0x4d0 [ 553.155348][T11250] ? list_netdevice+0x4c0/0x4c0 [ 553.160043][T11250] __tun_detach+0xd14/0x1510 [ 553.164462][T11250] ? mutex_trylock+0xa0/0xa0 [ 553.168983][T11250] tun_chr_close+0x92/0x140 [ 553.173313][T11250] ? tun_chr_open+0x530/0x530 [ 553.177861][T11250] __fput+0x309/0x760 [ 553.181650][T11250] ____fput+0x15/0x20 [ 553.185464][T11250] task_work_run+0x129/0x190 [ 553.189920][T11250] exit_to_user_mode_loop+0xbf/0xd0 [ 553.194928][T11250] syscall_exit_to_user_mode+0xa2/0x1a0 [ 553.200306][T11250] do_syscall_64+0x40/0x70 [ 553.204562][T11250] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 553.210290][T11250] RIP: 0033:0x7f1464192bd9 [ 553.214541][T11250] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 553.233983][T11250] RSP: 002b:00007f1463414048 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 553.242228][T11250] RAX: 0000000000000000 RBX: 00007f1464320f60 RCX: 00007f1464192bd9 [ 553.250040][T11250] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 553.257851][T11250] RBP: 00007f14634140a0 R08: 0000000000000000 R09: 0000000000000000 [ 553.265661][T11250] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 553.273473][T11250] R13: 000000000000000b R14: 00007f1464320f60 R15: 00007ffda12d1788 [ 558.433658][T11425] device pim6reg1 entered promiscuous mode [ 559.898165][T11479] device pim6reg1 entered promiscuous mode [ 577.628206][T11959] device pim6reg1 entered promiscuous mode [ 578.670851][T11992] device pim6reg1 entered promiscuous mode [ 579.448459][T12019] device pim6reg1 entered promiscuous mode [ 580.452094][T12053] device pim6reg1 entered promiscuous mode [ 582.588565][T12088] device pim6reg1 entered promiscuous mode [ 583.859474][T12126] device pim6reg1 entered promiscuous mode [ 585.701718][T12155] device pim6reg1 entered promiscuous mode [ 591.347025][T12254] FAULT_INJECTION: forcing a failure. [ 591.347025][T12254] name failslab, interval 1, probability 0, space 0, times 0 [ 591.386350][T12254] CPU: 1 PID: 12254 Comm: syz.4.4568 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 591.397696][T12254] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 591.407593][T12254] Call Trace: [ 591.410729][T12254] dump_stack_lvl+0x1e2/0x24b [ 591.415242][T12254] ? bfq_pos_tree_add_move+0x43b/0x43b [ 591.420531][T12254] ? dup_task_struct+0x29/0xc30 [ 591.425213][T12254] dump_stack+0x15/0x17 [ 591.429207][T12254] should_fail+0x3c6/0x510 [ 591.433461][T12254] ? dup_task_struct+0x57/0xc30 [ 591.438145][T12254] __should_failslab+0xa4/0xe0 [ 591.442744][T12254] should_failslab+0x9/0x20 [ 591.447084][T12254] kmem_cache_alloc+0x3d/0x2e0 [ 591.451686][T12254] ? __kasan_check_write+0x14/0x20 [ 591.456640][T12254] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 591.461590][T12254] dup_task_struct+0x57/0xc30 [ 591.466110][T12254] ? __kasan_check_write+0x14/0x20 [ 591.471039][T12254] copy_process+0x5c8/0x3340 [ 591.475468][T12254] ? timerqueue_add+0x24c/0x270 [ 591.480163][T12254] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 591.485099][T12254] ? enqueue_hrtimer+0xad/0x200 [ 591.489784][T12254] ? __hrtimer_run_queues+0x9ea/0xa50 [ 591.495079][T12254] kernel_clone+0x21e/0x9e0 [ 591.499416][T12254] ? ktime_get+0x10e/0x140 [ 591.503667][T12254] ? create_io_thread+0x1e0/0x1e0 [ 591.508532][T12254] __x64_sys_clone+0x23f/0x290 [ 591.513128][T12254] ? __do_sys_vfork+0x130/0x130 [ 591.517816][T12254] ? sched_clock+0x3a/0x40 [ 591.522076][T12254] ? debug_smp_processor_id+0x17/0x20 [ 591.527278][T12254] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 591.533181][T12254] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 591.539082][T12254] ? irqentry_exit_to_user_mode+0x41/0x80 [ 591.544633][T12254] do_syscall_64+0x34/0x70 [ 591.548890][T12254] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 591.554616][T12254] RIP: 0033:0x7fdf62c30bd9 [ 591.558875][T12254] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 591.578312][T12254] RSP: 002b:00007fdf61eb1ff8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 591.586555][T12254] RAX: ffffffffffffffda RBX: 00007fdf62dbef60 RCX: 00007fdf62c30bd9 [ 591.594376][T12254] RDX: 0000000000000000 RSI: 0000000020002970 RDI: 000000000a004000 [ 591.602278][T12254] RBP: 00007fdf61eb20a0 R08: 0000000020002d00 R09: 0000000020002d00 [ 591.610084][T12254] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 591.617897][T12254] R13: 000000000000000b R14: 00007fdf62dbef60 R15: 00007ffff4481998 [ 592.778986][T12280] device pim6reg1 entered promiscuous mode [ 593.884532][T12315] device pim6reg1 entered promiscuous mode [ 594.033627][T12324] syz.3.4594[12324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 594.033682][T12324] syz.3.4594[12324] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 594.804690][T12352] device pim6reg1 entered promiscuous mode [ 595.470120][T12395] device pim6reg1 entered promiscuous mode [ 597.058983][T12431] device pim6reg1 entered promiscuous mode [ 598.358948][T12454] FAULT_INJECTION: forcing a failure. [ 598.358948][T12454] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 598.372004][T12454] CPU: 1 PID: 12454 Comm: syz.3.4642 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 598.383162][T12454] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 598.393060][T12454] Call Trace: [ 598.396194][T12454] dump_stack_lvl+0x1e2/0x24b [ 598.400702][T12454] ? bfq_pos_tree_add_move+0x43b/0x43b [ 598.405995][T12454] ? memset+0x35/0x40 [ 598.409817][T12454] dump_stack+0x15/0x17 [ 598.413802][T12454] should_fail+0x3c6/0x510 [ 598.418058][T12454] should_fail_usercopy+0x1a/0x20 [ 598.422920][T12454] _copy_from_user+0x20/0xd0 [ 598.427347][T12454] ___sys_recvmsg+0x150/0x690 [ 598.431859][T12454] ? __sys_recvmsg+0x270/0x270 [ 598.436471][T12454] ? __fdget+0x1bc/0x240 [ 598.440547][T12454] __x64_sys_recvmsg+0x1ee/0x2c0 [ 598.445310][T12454] ? ___sys_recvmsg+0x690/0x690 [ 598.450003][T12454] ? debug_smp_processor_id+0x17/0x20 [ 598.455209][T12454] do_syscall_64+0x34/0x70 [ 598.459465][T12454] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 598.465188][T12454] RIP: 0033:0x7f1464192bd9 [ 598.469439][T12454] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 598.488881][T12454] RSP: 002b:00007f1463414048 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 598.497123][T12454] RAX: ffffffffffffffda RBX: 00007f1464320f60 RCX: 00007f1464192bd9 [ 598.504935][T12454] RDX: 0000000000000000 RSI: 0000000020001380 RDI: 0000000000000006 [ 598.512747][T12454] RBP: 00007f14634140a0 R08: 0000000000000000 R09: 0000000000000000 [ 598.520557][T12454] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 598.528369][T12454] R13: 000000000000000b R14: 00007f1464320f60 R15: 00007ffda12d1788 [ 599.701246][T12476] device pim6reg1 entered promiscuous mode [ 602.598356][T12522] device pim6reg1 entered promiscuous mode [ 603.906320][T12558] device pim6reg1 entered promiscuous mode [ 604.187171][T12564] device pim6reg1 entered promiscuous mode [ 606.136085][T12603] FAULT_INJECTION: forcing a failure. [ 606.136085][T12603] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 606.149860][T12603] CPU: 1 PID: 12603 Comm: syz.4.4696 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 606.161027][T12603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 606.171004][T12603] Call Trace: [ 606.174142][T12603] dump_stack_lvl+0x1e2/0x24b [ 606.178649][T12603] ? bfq_pos_tree_add_move+0x43b/0x43b [ 606.183940][T12603] dump_stack+0x15/0x17 [ 606.187935][T12603] should_fail+0x3c6/0x510 [ 606.192187][T12603] should_fail_usercopy+0x1a/0x20 [ 606.197048][T12603] _copy_to_user+0x20/0x90 [ 606.201298][T12603] simple_read_from_buffer+0xc7/0x150 [ 606.206508][T12603] proc_fail_nth_read+0x1a3/0x210 [ 606.211368][T12603] ? security_file_permission+0x7b/0xb0 [ 606.216748][T12603] ? proc_fault_inject_write+0x390/0x390 [ 606.222221][T12603] ? security_file_permission+0x86/0xb0 [ 606.227599][T12603] ? rw_verify_area+0x1c3/0x360 [ 606.232282][T12603] ? proc_fault_inject_write+0x390/0x390 [ 606.237752][T12603] vfs_read+0x204/0xbb0 [ 606.241753][T12603] ? kernel_read+0x70/0x70 [ 606.245999][T12603] ? __kasan_check_write+0x14/0x20 [ 606.250942][T12603] ? mutex_lock+0xa5/0x110 [ 606.255208][T12603] ? mutex_trylock+0xa0/0xa0 [ 606.259628][T12603] ? __fdget_pos+0x2e7/0x3a0 [ 606.264138][T12603] ? ksys_read+0x77/0x2c0 [ 606.268310][T12603] ksys_read+0x199/0x2c0 [ 606.272382][T12603] ? vfs_write+0xe70/0xe70 [ 606.276634][T12603] ? pick_file+0x242/0x2b0 [ 606.280890][T12603] ? debug_smp_processor_id+0x17/0x20 [ 606.286097][T12603] __x64_sys_read+0x7b/0x90 [ 606.290432][T12603] do_syscall_64+0x34/0x70 [ 606.294701][T12603] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 606.300417][T12603] RIP: 0033:0x7fdf62c2f6bc [ 606.304668][T12603] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48 [ 606.324117][T12603] RSP: 002b:00007fdf61eb2040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 606.332362][T12603] RAX: ffffffffffffffda RBX: 00007fdf62dbef60 RCX: 00007fdf62c2f6bc [ 606.340177][T12603] RDX: 000000000000000f RSI: 00007fdf61eb20b0 RDI: 0000000000000003 [ 606.347989][T12603] RBP: 00007fdf61eb20a0 R08: 0000000000000000 R09: 0000000000000000 [ 606.355804][T12603] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 606.363603][T12603] R13: 000000000000000b R14: 00007fdf62dbef60 R15: 00007ffff4481998 [ 609.001897][T12696] FAULT_INJECTION: forcing a failure. [ 609.001897][T12696] name failslab, interval 1, probability 0, space 0, times 0 [ 609.024534][T12696] CPU: 0 PID: 12696 Comm: syz.0.4731 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 609.035716][T12696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 609.045692][T12696] Call Trace: [ 609.048830][T12696] dump_stack_lvl+0x1e2/0x24b [ 609.053342][T12696] ? bfq_pos_tree_add_move+0x43b/0x43b [ 609.058631][T12696] ? kmem_cache_free+0xa9/0x1e0 [ 609.063313][T12696] ? kasan_set_track+0x5d/0x70 [ 609.067923][T12696] dump_stack+0x15/0x17 [ 609.071910][T12696] should_fail+0x3c6/0x510 [ 609.076161][T12696] ? dup_task_struct+0x57/0xc30 [ 609.080850][T12696] __should_failslab+0xa4/0xe0 [ 609.085535][T12696] should_failslab+0x9/0x20 [ 609.089873][T12696] kmem_cache_alloc+0x3d/0x2e0 [ 609.094474][T12696] ? __kasan_check_write+0x14/0x20 [ 609.099420][T12696] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 609.104367][T12696] dup_task_struct+0x57/0xc30 [ 609.108883][T12696] ? __kasan_check_write+0x14/0x20 [ 609.113829][T12696] copy_process+0x5c8/0x3340 [ 609.118256][T12696] ? proc_fail_nth_write+0x20b/0x290 [ 609.123383][T12696] ? proc_fail_nth_read+0x210/0x210 [ 609.128411][T12696] ? security_file_permission+0x86/0xb0 [ 609.133791][T12696] ? rw_verify_area+0x1c3/0x360 [ 609.138475][T12696] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 609.143420][T12696] ? vfs_write+0x854/0xe70 [ 609.147710][T12696] kernel_clone+0x21e/0x9e0 [ 609.152011][T12696] ? __kasan_check_write+0x14/0x20 [ 609.156957][T12696] ? create_io_thread+0x1e0/0x1e0 [ 609.161818][T12696] __x64_sys_clone+0x23f/0x290 [ 609.166415][T12696] ? __do_sys_vfork+0x130/0x130 [ 609.171111][T12696] ? debug_smp_processor_id+0x17/0x20 [ 609.176312][T12696] do_syscall_64+0x34/0x70 [ 609.180567][T12696] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 609.186294][T12696] RIP: 0033:0x7fded987dbd9 [ 609.190547][T12696] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 609.209993][T12696] RSP: 002b:00007fded8addff8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 609.218232][T12696] RAX: ffffffffffffffda RBX: 00007fded9a0c038 RCX: 00007fded987dbd9 [ 609.226570][T12696] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040b04000 [ 609.234380][T12696] RBP: 00007fded8ade0a0 R08: 0000000000000000 R09: 0000000000000000 [ 609.242198][T12696] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 609.250092][T12696] R13: 000000000000006e R14: 00007fded9a0c038 R15: 00007fff95e0cca8 [ 611.060075][T12772] FAULT_INJECTION: forcing a failure. [ 611.060075][T12772] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 611.075501][T12772] CPU: 0 PID: 12772 Comm: syz.4.4764 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 611.086674][T12772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 611.096595][T12772] Call Trace: [ 611.099714][T12772] dump_stack_lvl+0x1e2/0x24b [ 611.104214][T12772] ? bfq_pos_tree_add_move+0x43b/0x43b [ 611.109516][T12772] dump_stack+0x15/0x17 [ 611.113504][T12772] should_fail+0x3c6/0x510 [ 611.117748][T12772] should_fail_usercopy+0x1a/0x20 [ 611.122606][T12772] _copy_to_user+0x20/0x90 [ 611.126866][T12772] simple_read_from_buffer+0xc7/0x150 [ 611.132070][T12772] proc_fail_nth_read+0x1a3/0x210 [ 611.136923][T12772] ? security_file_permission+0x7b/0xb0 [ 611.142306][T12772] ? proc_fault_inject_write+0x390/0x390 [ 611.147772][T12772] ? security_file_permission+0x86/0xb0 [ 611.153155][T12772] ? rw_verify_area+0x1c3/0x360 [ 611.157839][T12772] ? proc_fault_inject_write+0x390/0x390 [ 611.163307][T12772] vfs_read+0x204/0xbb0 [ 611.167319][T12772] ? kernel_read+0x70/0x70 [ 611.171575][T12772] ? __kasan_check_write+0x14/0x20 [ 611.176506][T12772] ? mutex_lock+0xa5/0x110 [ 611.180759][T12772] ? mutex_trylock+0xa0/0xa0 [ 611.185188][T12772] ? __fdget_pos+0x2e7/0x3a0 [ 611.189610][T12772] ? ksys_read+0x77/0x2c0 [ 611.193781][T12772] ksys_read+0x199/0x2c0 [ 611.197857][T12772] ? vfs_write+0xe70/0xe70 [ 611.202111][T12772] ? debug_smp_processor_id+0x17/0x20 [ 611.207325][T12772] __x64_sys_read+0x7b/0x90 [ 611.211657][T12772] do_syscall_64+0x34/0x70 [ 611.215911][T12772] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 611.221647][T12772] RIP: 0033:0x7fdf62c2f6bc [ 611.225894][T12772] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48 [ 611.245333][T12772] RSP: 002b:00007fdf61eb2040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 611.253923][T12772] RAX: ffffffffffffffda RBX: 00007fdf62dbef60 RCX: 00007fdf62c2f6bc [ 611.261732][T12772] RDX: 000000000000000f RSI: 00007fdf61eb20b0 RDI: 0000000000000003 [ 611.269551][T12772] RBP: 00007fdf61eb20a0 R08: 0000000000000000 R09: 0000000000000000 [ 611.277358][T12772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 611.285167][T12772] R13: 000000000000000b R14: 00007fdf62dbef60 R15: 00007ffff4481998 [ 611.823853][T12792] device syzkaller0 entered promiscuous mode [ 611.825730][T12797] FAULT_INJECTION: forcing a failure. [ 611.825730][T12797] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 611.842912][T12797] CPU: 1 PID: 12797 Comm: syz.0.4774 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 611.854080][T12797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 611.864065][T12797] Call Trace: [ 611.867201][T12797] dump_stack_lvl+0x1e2/0x24b [ 611.871709][T12797] ? bfq_pos_tree_add_move+0x43b/0x43b [ 611.876995][T12797] dump_stack+0x15/0x17 [ 611.880987][T12797] should_fail+0x3c6/0x510 [ 611.885245][T12797] should_fail_alloc_page+0x52/0x60 [ 611.890273][T12797] __alloc_pages_nodemask+0x1b3/0xaf0 [ 611.895483][T12797] ? kvm_sched_clock_read+0x18/0x40 [ 611.900519][T12797] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 611.905902][T12797] ? sched_clock+0x3a/0x40 [ 611.910326][T12797] ? avc_has_perm_noaudit+0x117/0x240 [ 611.915537][T12797] shmem_alloc_page+0x257/0x420 [ 611.920217][T12797] ? put_page+0xd0/0xd0 [ 611.924215][T12797] ? sched_clock_cpu+0x1b/0x3b0 [ 611.928903][T12797] ? percpu_counter_add_batch+0x13d/0x160 [ 611.934455][T12797] shmem_alloc_and_acct_page+0x395/0x8e0 [ 611.939923][T12797] ? shmem_swapin_page+0x1950/0x1950 [ 611.945041][T12797] ? __irq_exit_rcu+0x40/0x150 [ 611.949640][T12797] ? irq_exit_rcu+0x9/0x10 [ 611.953891][T12797] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 611.959535][T12797] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 611.965530][T12797] ? shmem_getpage_gfp+0x77b/0x2480 [ 611.970587][T12797] ? __sanitizer_cov_trace_switch+0xcd/0xe0 [ 611.976375][T12797] shmem_getpage_gfp+0x891/0x2480 [ 611.981235][T12797] ? __kasan_check_write+0x14/0x20 [ 611.986184][T12797] ? shmem_getpage+0xa0/0xa0 [ 611.990610][T12797] ? iov_iter_fault_in_readable+0x31f/0x4f0 [ 611.996338][T12797] shmem_write_begin+0xca/0x1b0 [ 612.001025][T12797] generic_perform_write+0x2cd/0x570 [ 612.006145][T12797] ? grab_cache_page_write_begin+0xa0/0xa0 [ 612.011784][T12797] ? file_remove_privs+0x570/0x570 [ 612.016733][T12797] ? generic_write_checks+0x1ad/0x470 [ 612.021942][T12797] __generic_file_write_iter+0x23c/0x560 [ 612.027405][T12797] ? generic_write_checks+0x3b9/0x470 [ 612.032616][T12797] generic_file_write_iter+0xaf/0x1c0 [ 612.037821][T12797] vfs_write+0xb55/0xe70 [ 612.041902][T12797] ? kernel_write+0x3d0/0x3d0 [ 612.046415][T12797] ? mutex_trylock+0xa0/0xa0 [ 612.050846][T12797] ? __fdget_pos+0x2e7/0x3a0 [ 612.055264][T12797] ? ksys_write+0x77/0x2c0 [ 612.059526][T12797] ksys_write+0x199/0x2c0 [ 612.063687][T12797] ? __kasan_check_write+0x14/0x20 [ 612.068634][T12797] ? __ia32_sys_read+0x90/0x90 [ 612.073232][T12797] ? __kasan_check_read+0x11/0x20 [ 612.078095][T12797] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 612.083995][T12797] __x64_sys_write+0x7b/0x90 [ 612.088423][T12797] do_syscall_64+0x34/0x70 [ 612.092675][T12797] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 612.098406][T12797] RIP: 0033:0x7fded987dbd9 [ 612.102657][T12797] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 612.122097][T12797] RSP: 002b:00007fded8aff048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 612.130340][T12797] RAX: ffffffffffffffda RBX: 00007fded9a0bf60 RCX: 00007fded987dbd9 [ 612.138152][T12797] RDX: 0000000000043451 RSI: 0000000020000200 RDI: 0000000000000004 [ 612.146050][T12797] RBP: 00007fded8aff0a0 R08: 0000000000000000 R09: 0000000000000000 [ 612.153861][T12797] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 612.161674][T12797] R13: 000000000000000b R14: 00007fded9a0bf60 R15: 00007fff95e0cca8 [ 613.195810][T12853] cgroup: fork rejected by pids controller in /syz0 [ 613.596592][T12886] cgroup: fork rejected by pids controller in /syz2 [ 613.936486][T12890] bridge0: port 1(bridge_slave_0) entered blocking state [ 613.943567][T12890] bridge0: port 1(bridge_slave_0) entered disabled state [ 613.951131][T12890] device bridge_slave_0 entered promiscuous mode [ 613.967253][T12890] bridge0: port 2(bridge_slave_1) entered blocking state [ 613.985186][T12890] bridge0: port 2(bridge_slave_1) entered disabled state [ 613.998504][T12890] device bridge_slave_1 entered promiscuous mode [ 614.282055][T12919] cgroup: fork rejected by pids controller in /syz3 [ 614.284006][T12890] bridge0: port 2(bridge_slave_1) entered blocking state [ 614.295340][T12890] bridge0: port 2(bridge_slave_1) entered forwarding state [ 614.302480][T12890] bridge0: port 1(bridge_slave_0) entered blocking state [ 614.309243][T12890] bridge0: port 1(bridge_slave_0) entered forwarding state [ 614.327470][T12900] bridge0: port 1(bridge_slave_0) entered blocking state [ 614.341726][T12900] bridge0: port 1(bridge_slave_0) entered disabled state [ 614.362250][T12900] device bridge_slave_0 entered promiscuous mode [ 614.412020][T12900] bridge0: port 2(bridge_slave_1) entered blocking state [ 614.424747][T12900] bridge0: port 2(bridge_slave_1) entered disabled state [ 614.433476][T12900] device bridge_slave_1 entered promiscuous mode [ 614.490838][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 614.501759][ T25] bridge0: port 1(bridge_slave_0) entered disabled state [ 614.558028][ T25] bridge0: port 2(bridge_slave_1) entered disabled state [ 614.737247][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 614.746168][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 614.754238][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 614.762138][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 614.769704][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 614.777914][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 614.784733][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 614.792023][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 614.799965][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 614.806805][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 614.813927][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 614.821651][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 614.830712][T12890] device veth0_vlan entered promiscuous mode [ 614.900708][T12890] device veth1_macvtap entered promiscuous mode [ 614.924847][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 614.933478][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 614.941756][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 614.976148][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 614.984626][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 614.994450][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 615.003850][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 615.012530][T12938] device pim6reg1 entered promiscuous mode [ 615.054458][T12934] bridge0: port 1(bridge_slave_0) entered blocking state [ 615.061455][T12934] bridge0: port 1(bridge_slave_0) entered disabled state [ 615.068740][T12934] device bridge_slave_0 entered promiscuous mode [ 615.092620][T12934] bridge0: port 2(bridge_slave_1) entered blocking state [ 615.104627][T12934] bridge0: port 2(bridge_slave_1) entered disabled state [ 615.112413][T12934] device bridge_slave_1 entered promiscuous mode [ 615.191325][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 615.200417][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 615.243294][T12934] bridge0: port 2(bridge_slave_1) entered blocking state [ 615.250161][T12934] bridge0: port 2(bridge_slave_1) entered forwarding state [ 615.257296][T12934] bridge0: port 1(bridge_slave_0) entered blocking state [ 615.264139][T12934] bridge0: port 1(bridge_slave_0) entered forwarding state [ 615.287723][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 615.297943][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 615.305069][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 615.316284][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 615.324702][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 615.331553][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 615.338905][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 615.347077][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 615.355145][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 615.362002][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 615.420361][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 615.488539][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 615.496325][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 615.514314][T12900] device veth0_vlan entered promiscuous mode [ 615.526458][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 615.534992][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 615.542812][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 615.551059][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 615.567900][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 615.581894][T12900] device veth1_macvtap entered promiscuous mode [ 615.593787][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 615.602650][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 615.610770][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 615.617616][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 615.641046][T12977] FAULT_INJECTION: forcing a failure. [ 615.641046][T12977] name failslab, interval 1, probability 0, space 0, times 0 [ 615.661911][T12977] CPU: 1 PID: 12977 Comm: syz.1.4844 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 615.673087][T12977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 615.683243][T12977] Call Trace: [ 615.686380][T12977] dump_stack_lvl+0x1e2/0x24b [ 615.690881][T12977] ? panic+0x812/0x812 [ 615.694793][T12977] ? bfq_pos_tree_add_move+0x43b/0x43b [ 615.700084][T12977] ? __alloc_pages_nodemask+0xaf0/0xaf0 [ 615.705459][T12977] ? lruvec_init+0x150/0x150 [ 615.709889][T12977] dump_stack+0x15/0x17 [ 615.713890][T12977] should_fail+0x3c6/0x510 [ 615.718137][T12977] ? __get_vm_area_node+0x116/0x470 [ 615.723169][T12977] __should_failslab+0xa4/0xe0 [ 615.727855][T12977] should_failslab+0x9/0x20 [ 615.732197][T12977] kmem_cache_alloc_trace+0x3a/0x2e0 [ 615.737316][T12977] __get_vm_area_node+0x116/0x470 [ 615.742176][T12977] __vmalloc_node_range+0xdc/0x7c0 [ 615.747121][T12977] ? bpf_check+0x1c6/0xf2b0 [ 615.751474][T12977] ? kasan_poison+0x5d/0x70 [ 615.755899][T12977] ? __kasan_kmalloc_large+0xad/0xc0 [ 615.761011][T12977] ? bpf_check+0x1c6/0xf2b0 [ 615.765348][T12977] vzalloc+0x78/0x90 [ 615.769083][T12977] ? bpf_check+0x1c6/0xf2b0 [ 615.773417][T12977] bpf_check+0x1c6/0xf2b0 [ 615.777589][T12977] ? stack_depot_save+0xe/0x10 [ 615.782186][T12977] ? save_stack+0x1c3/0x240 [ 615.786528][T12977] ? __alloc_pages_nodemask+0x435/0xaf0 [ 615.791909][T12977] ? __vmalloc_node_range+0x36c/0x7c0 [ 615.797115][T12977] ? __vmalloc+0x7a/0x90 [ 615.801195][T12977] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 615.806754][T12977] ? bpf_prog_alloc+0x21/0x1e0 [ 615.811356][T12977] ? __se_sys_bpf+0x9856/0x11cb0 [ 615.816132][T12977] ? kvm_sched_clock_read+0x18/0x40 [ 615.821166][T12977] ? sched_clock+0x3a/0x40 [ 615.825423][T12977] ? 0xffffffffa0018000 [ 615.829412][T12977] ? bpf_get_btf_vmlinux+0x60/0x60 [ 615.834361][T12977] ? __kernel_text_address+0x9b/0x110 [ 615.839566][T12977] ? unwind_get_return_address+0x4d/0x90 [ 615.845030][T12977] ? arch_stack_walk+0xf3/0x140 [ 615.849721][T12977] ? stack_trace_save+0x113/0x1c0 [ 615.854579][T12977] ? stack_trace_snprint+0xf0/0xf0 [ 615.859527][T12977] ? stack_trace_snprint+0xf0/0xf0 [ 615.864475][T12977] ? selinux_bpf_prog_alloc+0x51/0x140 [ 615.869772][T12977] ? selinux_bpf_prog_alloc+0x51/0x140 [ 615.875066][T12977] ? ____kasan_kmalloc+0xed/0x110 [ 615.879926][T12977] ? ____kasan_kmalloc+0xdb/0x110 [ 615.884782][T12977] ? __kasan_kmalloc+0x9/0x10 [ 615.889301][T12977] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 615.894719][T12977] ? selinux_bpf_prog_alloc+0x51/0x140 [ 615.899974][T12977] ? security_bpf_prog_alloc+0x62/0x90 [ 615.905269][T12977] ? __se_sys_bpf+0x9f8c/0x11cb0 [ 615.910043][T12977] ? __x64_sys_bpf+0x7b/0x90 [ 615.914467][T12977] ? do_syscall_64+0x34/0x70 [ 615.918984][T12977] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 615.924896][T12977] ? __kasan_kmalloc+0x9/0x10 [ 615.929395][T12977] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 615.934779][T12977] ? selinux_bpf_prog_alloc+0x51/0x140 [ 615.940127][T12977] __se_sys_bpf+0x107a2/0x11cb0 [ 615.944765][T12977] ? kmem_cache_free+0xa9/0x1e0 [ 615.949445][T12977] ? kmem_cache_free+0xa9/0x1e0 [ 615.954141][T12977] ? kasan_set_track+0x5d/0x70 [ 615.958740][T12977] ? kasan_set_track+0x4b/0x70 [ 615.963329][T12977] ? kasan_set_free_info+0x23/0x40 [ 615.968281][T12977] ? ____kasan_slab_free+0x121/0x160 [ 615.973413][T12977] ? __kasan_slab_free+0x11/0x20 [ 615.978176][T12977] ? __x64_sys_bpf+0x90/0x90 [ 615.982600][T12977] ? do_sys_openat2+0x5e1/0x6f0 [ 615.987285][T12977] ? __x64_sys_openat+0x243/0x290 [ 615.992148][T12977] ? do_syscall_64+0x34/0x70 [ 615.996578][T12977] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 616.002482][T12977] ? _kstrtoull+0x3a0/0x4a0 [ 616.006821][T12977] ? memset+0x35/0x40 [ 616.010634][T12977] ? __fsnotify_parent+0x4b9/0x6c0 [ 616.015584][T12977] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 616.022181][T12977] ? proc_fail_nth_write+0x20b/0x290 [ 616.027303][T12977] ? proc_fail_nth_read+0x210/0x210 [ 616.032333][T12977] ? security_file_permission+0x86/0xb0 [ 616.037801][T12977] ? rw_verify_area+0x1c3/0x360 [ 616.042487][T12977] ? slab_free_freelist_hook+0xc0/0x190 [ 616.047871][T12977] ? preempt_count_add+0x92/0x1a0 [ 616.052729][T12977] ? vfs_write+0x854/0xe70 [ 616.056989][T12977] ? kernel_write+0x3d0/0x3d0 [ 616.061502][T12977] ? __kasan_check_write+0x14/0x20 [ 616.066441][T12977] ? mutex_lock+0xa5/0x110 [ 616.070696][T12977] ? mutex_trylock+0xa0/0xa0 [ 616.075129][T12977] ? __kasan_check_write+0x14/0x20 [ 616.080070][T12977] ? fput_many+0x160/0x1b0 [ 616.084327][T12977] ? debug_smp_processor_id+0x17/0x20 [ 616.089532][T12977] __x64_sys_bpf+0x7b/0x90 [ 616.093788][T12977] do_syscall_64+0x34/0x70 [ 616.098087][T12977] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 616.103761][T12977] RIP: 0033:0x7fd4cfac0bd9 [ 616.108019][T12977] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 616.127458][T12977] RSP: 002b:00007fd4ced42048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 616.135700][T12977] RAX: ffffffffffffffda RBX: 00007fd4cfc4ef60 RCX: 00007fd4cfac0bd9 [ 616.143611][T12977] RDX: 0000000000000048 RSI: 000000002000e000 RDI: 0000000000000005 [ 616.151412][T12977] RBP: 00007fd4ced420a0 R08: 0000000000000000 R09: 0000000000000000 [ 616.159223][T12977] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 616.167059][T12977] R13: 000000000000000b R14: 00007fd4cfc4ef60 R15: 00007ffe30e82ec8 [ 616.193589][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 616.202077][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 616.212076][T12977] syz.1.4844: vmalloc: allocation failure: 160 bytes, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz1,mems_allowed=0 [ 616.228793][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 616.236733][T12977] CPU: 1 PID: 12977 Comm: syz.1.4844 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 616.247861][T12977] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 616.257770][T12977] Call Trace: [ 616.260897][T12977] dump_stack_lvl+0x1e2/0x24b [ 616.265483][T12977] ? wake_up_klogd+0xb8/0xf0 [ 616.269912][T12977] ? bfq_pos_tree_add_move+0x43b/0x43b [ 616.275272][T12977] ? pr_cont_kernfs_name+0xf0/0x100 [ 616.280238][T12977] dump_stack+0x15/0x17 [ 616.284317][T12977] warn_alloc+0x21a/0x390 [ 616.288484][T12977] ? __get_vm_area_node+0x116/0x470 [ 616.293529][T12977] ? zone_watermark_ok_safe+0x2b0/0x2b0 [ 616.298910][T12977] ? __get_vm_area_node+0x34b/0x470 [ 616.303938][T12977] __vmalloc_node_range+0x287/0x7c0 [ 616.308972][T12977] ? kasan_poison+0x5d/0x70 [ 616.313324][T12977] ? __kasan_kmalloc_large+0xad/0xc0 [ 616.318428][T12977] ? bpf_check+0x1c6/0xf2b0 [ 616.322768][T12977] vzalloc+0x78/0x90 [ 616.326499][T12977] ? bpf_check+0x1c6/0xf2b0 [ 616.330840][T12977] bpf_check+0x1c6/0xf2b0 [ 616.335007][T12977] ? stack_depot_save+0xe/0x10 [ 616.339690][T12977] ? save_stack+0x1c3/0x240 [ 616.344041][T12977] ? __alloc_pages_nodemask+0x435/0xaf0 [ 616.349411][T12977] ? __vmalloc_node_range+0x36c/0x7c0 [ 616.354616][T12977] ? __vmalloc+0x7a/0x90 [ 616.358697][T12977] ? bpf_prog_alloc_no_stats+0x39/0x2a0 [ 616.364078][T12977] ? bpf_prog_alloc+0x21/0x1e0 [ 616.368677][T12977] ? __se_sys_bpf+0x9856/0x11cb0 [ 616.373569][T12977] ? kvm_sched_clock_read+0x18/0x40 [ 616.378666][T12977] ? sched_clock+0x3a/0x40 [ 616.382920][T12977] ? 0xffffffffa0018000 [ 616.386911][T12977] ? bpf_get_btf_vmlinux+0x60/0x60 [ 616.391858][T12977] ? __kernel_text_address+0x9b/0x110 [ 616.397064][T12977] ? unwind_get_return_address+0x4d/0x90 [ 616.402532][T12977] ? arch_stack_walk+0xf3/0x140 [ 616.407221][T12977] ? stack_trace_save+0x113/0x1c0 [ 616.412079][T12977] ? stack_trace_snprint+0xf0/0xf0 [ 616.417025][T12977] ? stack_trace_snprint+0xf0/0xf0 [ 616.424534][T12977] ? selinux_bpf_prog_alloc+0x51/0x140 [ 616.429785][T12977] ? selinux_bpf_prog_alloc+0x51/0x140 [ 616.435078][T12977] ? ____kasan_kmalloc+0xed/0x110 [ 616.439937][T12977] ? ____kasan_kmalloc+0xdb/0x110 [ 616.444813][T12977] ? __kasan_kmalloc+0x9/0x10 [ 616.449311][T12977] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 616.454689][T12977] ? selinux_bpf_prog_alloc+0x51/0x140 [ 616.459986][T12977] ? security_bpf_prog_alloc+0x62/0x90 [ 616.465283][T12977] ? __se_sys_bpf+0x9f8c/0x11cb0 [ 616.470052][T12977] ? __x64_sys_bpf+0x7b/0x90 [ 616.474487][T12977] ? do_syscall_64+0x34/0x70 [ 616.478906][T12977] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 616.484833][T12977] ? __kasan_kmalloc+0x9/0x10 [ 616.489338][T12977] ? kmem_cache_alloc_trace+0x18a/0x2e0 [ 616.495141][T12977] ? selinux_bpf_prog_alloc+0x51/0x140 [ 616.500442][T12977] __se_sys_bpf+0x107a2/0x11cb0 [ 616.505126][T12977] ? kmem_cache_free+0xa9/0x1e0 [ 616.509807][T12977] ? kmem_cache_free+0xa9/0x1e0 [ 616.514495][T12977] ? kasan_set_track+0x5d/0x70 [ 616.519097][T12977] ? kasan_set_track+0x4b/0x70 [ 616.523689][T12977] ? kasan_set_free_info+0x23/0x40 [ 616.528641][T12977] ? ____kasan_slab_free+0x121/0x160 [ 616.533760][T12977] ? __kasan_slab_free+0x11/0x20 [ 616.538537][T12977] ? __x64_sys_bpf+0x90/0x90 [ 616.542960][T12977] ? do_sys_openat2+0x5e1/0x6f0 [ 616.547650][T12977] ? __x64_sys_openat+0x243/0x290 [ 616.552506][T12977] ? do_syscall_64+0x34/0x70 [ 616.556943][T12977] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 616.562843][T12977] ? _kstrtoull+0x3a0/0x4a0 [ 616.567183][T12977] ? memset+0x35/0x40 [ 616.570997][T12977] ? __fsnotify_parent+0x4b9/0x6c0 [ 616.575947][T12977] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 616.582556][T12977] ? proc_fail_nth_write+0x20b/0x290 [ 616.587670][T12977] ? proc_fail_nth_read+0x210/0x210 [ 616.592697][T12977] ? security_file_permission+0x86/0xb0 [ 616.598250][T12977] ? rw_verify_area+0x1c3/0x360 [ 616.602940][T12977] ? slab_free_freelist_hook+0xc0/0x190 [ 616.608407][T12977] ? preempt_count_add+0x92/0x1a0 [ 616.613271][T12977] ? vfs_write+0x854/0xe70 [ 616.617520][T12977] ? kernel_write+0x3d0/0x3d0 [ 616.622031][T12977] ? __kasan_check_write+0x14/0x20 [ 616.626978][T12977] ? mutex_lock+0xa5/0x110 [ 616.631322][T12977] ? mutex_trylock+0xa0/0xa0 [ 616.635748][T12977] ? __kasan_check_write+0x14/0x20 [ 616.640700][T12977] ? fput_many+0x160/0x1b0 [ 616.644947][T12977] ? debug_smp_processor_id+0x17/0x20 [ 616.650155][T12977] __x64_sys_bpf+0x7b/0x90 [ 616.654425][T12977] do_syscall_64+0x34/0x70 [ 616.658658][T12977] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 616.664392][T12977] RIP: 0033:0x7fd4cfac0bd9 [ 616.668637][T12977] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 616.688083][T12977] RSP: 002b:00007fd4ced42048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 616.696327][T12977] RAX: ffffffffffffffda RBX: 00007fd4cfc4ef60 RCX: 00007fd4cfac0bd9 [ 616.704143][T12977] RDX: 0000000000000048 RSI: 000000002000e000 RDI: 0000000000000005 [ 616.711953][T12977] RBP: 00007fd4ced420a0 R08: 0000000000000000 R09: 0000000000000000 [ 616.719757][T12977] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 616.727570][T12977] R13: 000000000000000b R14: 00007fd4cfc4ef60 R15: 00007ffe30e82ec8 [ 616.746110][ T7263] bridge0: port 2(bridge_slave_1) entered blocking state [ 616.752975][ T7263] bridge0: port 2(bridge_slave_1) entered forwarding state [ 616.761037][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 616.768877][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 616.779639][T12977] Mem-Info: [ 616.782592][T12977] active_anon:121 inactive_anon:6501 isolated_anon:0 [ 616.782592][T12977] active_file:16756 inactive_file:4941 isolated_file:0 [ 616.782592][T12977] unevictable:0 dirty:315 writeback:0 [ 616.782592][T12977] slab_reclaimable:6850 slab_unreclaimable:77585 [ 616.782592][T12977] mapped:13354 shmem:181 pagetables:422 bounce:0 [ 616.782592][T12977] free:1587584 free_pcp:881 free_cma:0 [ 616.819381][T12977] Node 0 active_anon:484kB inactive_anon:26004kB active_file:67024kB inactive_file:19764kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:53416kB dirty:1260kB writeback:0kB shmem:728kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4992kB all_unreclaimable? no [ 616.848359][T12977] DMA32 free:2983352kB min:62624kB low:78280kB high:93936kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2984788kB mlocked:0kB pagetables:0kB bounce:0kB free_pcp:1436kB local_pcp:0kB free_cma:0kB [ 616.876506][T12977] lowmem_reserve[]: 0 3941 3941 [ 616.881248][T12977] Normal free:3366544kB min:84828kB low:106032kB high:127236kB reserved_highatomic:0KB active_anon:484kB inactive_anon:26004kB active_file:67024kB inactive_file:19764kB unevictable:0kB writepending:1260kB present:5242880kB managed:4035856kB mlocked:0kB pagetables:1744kB bounce:0kB free_pcp:2016kB local_pcp:656kB free_cma:0kB [ 616.890380][T12934] device veth0_vlan entered promiscuous mode [ 616.919760][T12977] lowmem_reserve[]: 0 0 0 [ 616.924127][T12977] DMA32: 8*4kB (UM) 3*8kB (M) 2*16kB (M) 5*32kB (UM) 7*64kB (UM) 6*128kB (UM) 6*256kB (UM) 5*512kB (M) 6*1024kB (UM) 3*2048kB (UM) 724*4096kB (M) = 2983352kB [ 616.944213][T12977] Normal: 359*4kB (ME) 88*8kB (UME) 154*16kB (ME) 361*32kB (UME) 594*64kB (UM) 166*128kB (UM) 57*256kB (UME) 21*512kB (UME) 11*1024kB (UM) 5*2048kB (UM) 792*4096kB (UM) = 3366300kB [ 616.967456][ T725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 616.975514][T12977] 21879 total pagecache pages [ 616.980551][T12977] 0 pages in swap cache [ 616.984505][T12977] Swap cache stats: add 0, delete 0, find 0/0 [ 616.985921][ T725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 616.990432][T12977] Free swap = 124996kB [ 616.990435][T12977] Total swap = 124996kB [ 616.990440][T12977] 2097051 pages RAM [ 616.990443][T12977] 0 pages HighMem/MovableOnly [ 616.990447][T12977] 341890 pages reserved [ 617.018753][T12977] 0 pages cma reserved [ 617.035873][ T725] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 617.043872][ T725] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 617.057726][T12934] device veth1_macvtap entered promiscuous mode [ 617.075343][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 617.082786][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 617.090101][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 617.098486][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 617.106354][ T2251] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 617.123434][T12969] bridge0: port 1(bridge_slave_0) entered blocking state [ 617.130440][T12969] bridge0: port 1(bridge_slave_0) entered disabled state [ 617.137978][T12969] device bridge_slave_0 entered promiscuous mode [ 617.144786][T12969] bridge0: port 2(bridge_slave_1) entered blocking state [ 617.151801][T12969] bridge0: port 2(bridge_slave_1) entered disabled state [ 617.158966][T12969] device bridge_slave_1 entered promiscuous mode [ 617.201584][ T48] device bridge_slave_1 left promiscuous mode [ 617.207699][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 617.214848][ T48] device bridge_slave_0 left promiscuous mode [ 617.220941][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 617.228548][ T48] device bridge_slave_1 left promiscuous mode [ 617.234450][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 617.241959][ T48] device bridge_slave_0 left promiscuous mode [ 617.248689][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 617.256283][ T48] device veth1_macvtap left promiscuous mode [ 617.262492][ T48] device veth1_macvtap left promiscuous mode [ 617.268521][ T48] device veth0_vlan left promiscuous mode [ 617.445637][T12999] cgroup: fork rejected by pids controller in /syz4 [ 617.482839][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 617.491320][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 617.499567][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 617.507682][ T286] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 617.788027][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 617.797140][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 617.809786][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 617.818133][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 617.826669][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 617.845739][ T25] bridge0: port 1(bridge_slave_0) entered blocking state [ 617.852602][ T25] bridge0: port 1(bridge_slave_0) entered forwarding state [ 617.868940][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 617.877177][ T25] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 617.885177][ T25] bridge0: port 2(bridge_slave_1) entered blocking state [ 617.892041][ T25] bridge0: port 2(bridge_slave_1) entered forwarding state [ 617.945450][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 617.967365][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 617.995354][T13009] bridge0: port 1(bridge_slave_0) entered blocking state [ 618.004204][T13009] bridge0: port 1(bridge_slave_0) entered disabled state [ 618.011640][T13009] device bridge_slave_0 entered promiscuous mode [ 618.036043][T12969] device veth0_vlan entered promiscuous mode [ 618.045261][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 618.071763][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 618.102662][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 618.129723][ T394] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 618.151721][T13009] bridge0: port 2(bridge_slave_1) entered blocking state [ 618.161010][T13009] bridge0: port 2(bridge_slave_1) entered disabled state [ 618.184717][T13009] device bridge_slave_1 entered promiscuous mode [ 618.227391][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 618.237392][T12969] device veth1_macvtap entered promiscuous mode [ 618.288729][ T1566] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 618.313684][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 618.530774][T13056] FAULT_INJECTION: forcing a failure. [ 618.530774][T13056] name failslab, interval 1, probability 0, space 0, times 0 [ 618.543229][T13056] CPU: 1 PID: 13056 Comm: syz.0.4868 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 618.554462][T13056] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 618.564345][T13056] Call Trace: [ 618.567514][T13056] dump_stack_lvl+0x1e2/0x24b [ 618.571986][T13056] ? panic+0x812/0x812 [ 618.575977][T13056] ? 0xffffffffa0018000 [ 618.579973][T13056] ? bfq_pos_tree_add_move+0x43b/0x43b [ 618.585288][T13056] ? stack_trace_save+0x1c0/0x1c0 [ 618.590127][T13056] ? __kernel_text_address+0x9b/0x110 [ 618.595334][T13056] dump_stack+0x15/0x17 [ 618.599587][T13056] should_fail+0x3c6/0x510 [ 618.603841][T13056] ? __alloc_skb+0x80/0x510 [ 618.608181][T13056] __should_failslab+0xa4/0xe0 [ 618.612781][T13056] should_failslab+0x9/0x20 [ 618.617118][T13056] kmem_cache_alloc+0x3d/0x2e0 [ 618.621804][T13056] ? find_next_bit+0xc7/0x100 [ 618.626323][T13056] ? cpumask_next+0x11/0x30 [ 618.630660][T13056] __alloc_skb+0x80/0x510 [ 618.634905][T13056] ? __fib6_drop_pcpu_from+0x271/0x2b0 [ 618.640207][T13056] inet6_rt_notify+0x2db/0x550 [ 618.644805][T13056] ? rt6_nh_dump_exceptions+0x650/0x650 [ 618.650192][T13056] fib6_del+0xce0/0x1060 [ 618.654278][T13056] ? fib6_locate+0x470/0x470 [ 618.658698][T13056] ? enqueue_task_fair+0xd14/0x2820 [ 618.663728][T13056] fib6_clean_node+0x2ed/0x550 [ 618.668332][T13056] ? node_free_rcu+0x30/0x30 [ 618.672750][T13056] ? __kasan_check_write+0x14/0x20 [ 618.677700][T13056] ? check_preempt_wakeup+0x564/0xbb0 [ 618.682909][T13056] fib6_walk_continue+0x52d/0x720 [ 618.687770][T13056] fib6_walk+0x172/0x2d0 [ 618.691847][T13056] fib6_clean_all+0x202/0x2c0 [ 618.696447][T13056] ? rt6_sync_down_dev+0x170/0x170 [ 618.701396][T13056] ? fib6_del+0x1060/0x1060 [ 618.705733][T13056] ? node_free_rcu+0x30/0x30 [ 618.710160][T13056] ? rt6_sync_down_dev+0x170/0x170 [ 618.715195][T13056] ? try_invoke_on_locked_down_task+0x280/0x280 [ 618.721317][T13056] ? schedule_preempt_disabled+0x20/0x20 [ 618.726738][T13056] rt6_disable_ip+0x156/0x720 [ 618.731251][T13056] ? preempt_schedule_thunk+0x16/0x18 [ 618.736465][T13056] ? fib6_ifdown+0x510/0x510 [ 618.740892][T13056] ? __kasan_check_read+0x11/0x20 [ 618.745820][T13056] addrconf_ifdown+0x160/0x1a60 [ 618.750436][T13056] ? wq_worker_last_func+0x50/0x50 [ 618.755436][T13056] ? nf_nat_masq_schedule+0x2b9/0x5a0 [ 618.760595][T13056] ? addrconf_cleanup+0x1b0/0x1b0 [ 618.765448][T13056] ? __kasan_check_write+0x14/0x20 [ 618.770394][T13056] ? mutex_lock+0xa5/0x110 [ 618.774646][T13056] ? mutex_trylock+0xa0/0xa0 [ 618.779078][T13056] ? __kasan_check_write+0x14/0x20 [ 618.784027][T13056] addrconf_notify+0x378/0xe90 [ 618.788622][T13056] raw_notifier_call_chain+0x8c/0xf0 [ 618.793743][T13056] __dev_notify_flags+0x304/0x610 [ 618.798604][T13056] ? __dev_change_flags+0x6e0/0x6e0 [ 618.803635][T13056] ? __dev_change_flags+0x56c/0x6e0 [ 618.808678][T13056] ? __ww_mutex_lock_interruptible_slowpath+0x20/0x20 [ 618.815272][T13056] ? dev_get_flags+0x1e0/0x1e0 [ 618.819882][T13056] ? selinux_capset+0xf0/0xf0 [ 618.824384][T13056] dev_change_flags+0xf0/0x1a0 [ 618.829039][T13056] dev_ifsioc+0x115/0xae0 [ 618.833154][T13056] ? dev_ioctl+0xb40/0xb40 [ 618.837399][T13056] ? dev_get_by_name_rcu+0xc5/0xf0 [ 618.842345][T13056] dev_ioctl+0x526/0xb40 [ 618.846457][T13056] sock_do_ioctl+0x295/0x3a0 [ 618.850854][T13056] ? sock_show_fdinfo+0xa0/0xa0 [ 618.855543][T13056] ? kernel_write+0x3d0/0x3d0 [ 618.860057][T13056] ? selinux_file_ioctl+0x3cc/0x540 [ 618.865093][T13056] sock_ioctl+0x4a6/0x760 [ 618.869261][T13056] ? sock_poll+0x340/0x340 [ 618.873510][T13056] ? security_file_ioctl+0x84/0xb0 [ 618.878454][T13056] ? sock_poll+0x340/0x340 [ 618.882707][T13056] __se_sys_ioctl+0x114/0x190 [ 618.887219][T13056] __x64_sys_ioctl+0x7b/0x90 [ 618.891646][T13056] do_syscall_64+0x34/0x70 [ 618.895905][T13056] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 618.901626][T13056] RIP: 0033:0x7f4efe819bd9 [ 618.905881][T13056] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 618.925408][T13056] RSP: 002b:00007f4efda9b048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 618.933653][T13056] RAX: ffffffffffffffda RBX: 00007f4efe9a7f60 RCX: 00007f4efe819bd9 [ 618.941463][T13056] RDX: 0000000020000000 RSI: 0000000000008914 RDI: 000000000000000b [ 618.949273][T13056] RBP: 00007f4efda9b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 618.957085][T13056] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 618.964895][T13056] R13: 000000000000000b R14: 00007f4efe9a7f60 R15: 00007ffc56213788 [ 619.050883][T13056] device veth0_vlan left promiscuous mode [ 619.058052][T13056] device veth0_vlan entered promiscuous mode [ 619.139178][ T6183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 619.149330][ T6183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 619.156656][ T6183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 619.165047][ T6183] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 619.184277][ T6183] bridge0: port 1(bridge_slave_0) entered blocking state [ 619.191168][ T6183] bridge0: port 1(bridge_slave_0) entered forwarding state [ 619.223222][ T6183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 619.255630][ T6183] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 619.269273][ T6183] bridge0: port 2(bridge_slave_1) entered blocking state [ 619.276136][ T6183] bridge0: port 2(bridge_slave_1) entered forwarding state [ 619.361759][ T1888] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 619.369675][ T1888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 619.377797][ T1888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 619.385789][ T1888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 619.395056][ T1888] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 619.429361][ T2173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 619.438408][ T2173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 619.453691][T13009] device veth0_vlan entered promiscuous mode [ 619.464250][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 619.472177][ T7263] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 619.486255][T13009] device veth1_macvtap entered promiscuous mode [ 619.495503][ T1888] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 619.503826][ T1888] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 619.606137][ T1888] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 619.676384][ T1888] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 619.744394][ T1888] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 619.826119][ T6183] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 619.838301][ T6183] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 619.855149][ T6183] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 619.882186][ T6183] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 620.765360][T13148] device pim6reg1 entered promiscuous mode [ 620.995999][ T48] device bridge_slave_1 left promiscuous mode [ 621.006502][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 621.014343][ T48] device bridge_slave_0 left promiscuous mode [ 621.021074][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 621.030910][ T48] device bridge_slave_1 left promiscuous mode [ 621.041801][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 621.053055][ T48] device bridge_slave_0 left promiscuous mode [ 621.059466][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 621.067822][ T48] device bridge_slave_1 left promiscuous mode [ 621.073786][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 621.082387][ T48] device bridge_slave_0 left promiscuous mode [ 621.089773][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 621.098779][ T48] device veth1_macvtap left promiscuous mode [ 621.104612][ T48] device veth0_vlan left promiscuous mode [ 621.110761][ T48] device veth1_macvtap left promiscuous mode [ 621.116590][ T48] device veth0_vlan left promiscuous mode [ 621.122768][ T48] device veth1_macvtap left promiscuous mode [ 621.128646][ T48] device veth0_vlan left promiscuous mode [ 621.471877][T13188] FAULT_INJECTION: forcing a failure. [ 621.471877][T13188] name failslab, interval 1, probability 0, space 0, times 0 [ 621.501898][T13188] CPU: 1 PID: 13188 Comm: syz.2.4920 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 621.513160][T13188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 621.523050][T13188] Call Trace: [ 621.526183][T13188] dump_stack_lvl+0x1e2/0x24b [ 621.530707][T13188] ? bfq_pos_tree_add_move+0x43b/0x43b [ 621.535991][T13188] dump_stack+0x15/0x17 [ 621.539979][T13188] should_fail+0x3c6/0x510 [ 621.544235][T13188] ? prepare_creds+0x2f/0x5f0 [ 621.548746][T13188] __should_failslab+0xa4/0xe0 [ 621.553346][T13188] should_failslab+0x9/0x20 [ 621.557773][T13188] kmem_cache_alloc+0x3d/0x2e0 [ 621.562549][T13188] prepare_creds+0x2f/0x5f0 [ 621.566888][T13188] copy_creds+0xe7/0x480 [ 621.570966][T13188] copy_process+0x93f/0x3340 [ 621.575392][T13188] ? proc_fail_nth_write+0x20b/0x290 [ 621.580518][T13188] ? proc_fail_nth_read+0x210/0x210 [ 621.585643][T13188] ? security_file_permission+0x86/0xb0 [ 621.591016][T13188] ? rw_verify_area+0x1c3/0x360 [ 621.595699][T13188] ? slab_free_freelist_hook+0xc0/0x190 [ 621.601083][T13188] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 621.606110][T13188] ? vfs_write+0x854/0xe70 [ 621.610555][T13188] kernel_clone+0x21e/0x9e0 [ 621.614889][T13188] ? __kasan_check_write+0x14/0x20 [ 621.619838][T13188] ? create_io_thread+0x1e0/0x1e0 [ 621.624700][T13188] __x64_sys_clone+0x23f/0x290 [ 621.629298][T13188] ? __do_sys_vfork+0x130/0x130 [ 621.633988][T13188] ? debug_smp_processor_id+0x17/0x20 [ 621.639194][T13188] do_syscall_64+0x34/0x70 [ 621.643445][T13188] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 621.649173][T13188] RIP: 0033:0x7f384a6ecbd9 [ 621.653446][T13188] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 621.672873][T13188] RSP: 002b:00007f384996dff8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 621.681112][T13188] RAX: ffffffffffffffda RBX: 00007f384a87af60 RCX: 00007f384a6ecbd9 [ 621.688921][T13188] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 621.696736][T13188] RBP: 00007f384996e0a0 R08: 0000000000000000 R09: 0000000000000000 [ 621.704632][T13188] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 621.712445][T13188] R13: 000000000000000b R14: 00007f384a87af60 R15: 00007fffedf89ff8 [ 622.306367][T13228] FAULT_INJECTION: forcing a failure. [ 622.306367][T13228] name failslab, interval 1, probability 0, space 0, times 0 [ 622.356877][T13228] CPU: 0 PID: 13228 Comm: syz.0.4935 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 622.368060][T13228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 622.377945][T13228] Call Trace: [ 622.381076][T13228] dump_stack_lvl+0x1e2/0x24b [ 622.385584][T13228] ? panic+0x812/0x812 [ 622.389490][T13228] ? bfq_pos_tree_add_move+0x43b/0x43b [ 622.394786][T13228] dump_stack+0x15/0x17 [ 622.398782][T13228] should_fail+0x3c6/0x510 [ 622.403032][T13228] ? __se_sys_bpf+0x4beb/0x11cb0 [ 622.407805][T13228] __should_failslab+0xa4/0xe0 [ 622.412404][T13228] should_failslab+0x9/0x20 [ 622.416748][T13228] __kmalloc_track_caller+0x5f/0x320 [ 622.421866][T13228] memdup_user+0x25/0xb0 [ 622.425942][T13228] __se_sys_bpf+0x4beb/0x11cb0 [ 622.430547][T13228] ? stack_trace_snprint+0xf0/0xf0 [ 622.435491][T13228] ? kmem_cache_free+0xa9/0x1e0 [ 622.440179][T13228] ? kmem_cache_free+0xa9/0x1e0 [ 622.444864][T13228] ? kasan_set_track+0x5d/0x70 [ 622.449466][T13228] ? kasan_set_track+0x4b/0x70 [ 622.454065][T13228] ? kasan_set_free_info+0x23/0x40 [ 622.459014][T13228] ? ____kasan_slab_free+0x121/0x160 [ 622.464131][T13228] ? __kasan_slab_free+0x11/0x20 [ 622.468907][T13228] ? __x64_sys_bpf+0x90/0x90 [ 622.473331][T13228] ? do_sys_openat2+0x5e1/0x6f0 [ 622.478019][T13228] ? __x64_sys_openat+0x243/0x290 [ 622.482878][T13228] ? do_syscall_64+0x34/0x70 [ 622.487307][T13228] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 622.493208][T13228] ? _kstrtoull+0x3a0/0x4a0 [ 622.497549][T13228] ? kstrtouint_from_user+0x20a/0x2a0 [ 622.502756][T13228] ? kstrtol_from_user+0x310/0x310 [ 622.507706][T13228] ? memset+0x35/0x40 [ 622.511525][T13228] ? __fsnotify_parent+0x4b9/0x6c0 [ 622.516470][T13228] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 622.523161][T13228] ? proc_fail_nth_write+0x20b/0x290 [ 622.528278][T13228] ? proc_fail_nth_read+0x210/0x210 [ 622.533307][T13228] ? security_file_permission+0x86/0xb0 [ 622.538691][T13228] ? rw_verify_area+0x1c3/0x360 [ 622.543374][T13228] ? slab_free_freelist_hook+0xc0/0x190 [ 622.548756][T13228] ? preempt_count_add+0x92/0x1a0 [ 622.553615][T13228] ? vfs_write+0x854/0xe70 [ 622.557883][T13228] ? kernel_write+0x3d0/0x3d0 [ 622.562386][T13228] ? __kasan_check_write+0x14/0x20 [ 622.567331][T13228] ? mutex_lock+0xa5/0x110 [ 622.571583][T13228] ? mutex_trylock+0xa0/0xa0 [ 622.576013][T13228] ? __kasan_check_write+0x14/0x20 [ 622.580958][T13228] ? fput_many+0x160/0x1b0 [ 622.585217][T13228] ? debug_smp_processor_id+0x17/0x20 [ 622.590433][T13228] __x64_sys_bpf+0x7b/0x90 [ 622.594670][T13228] do_syscall_64+0x34/0x70 [ 622.598925][T13228] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 622.604651][T13228] RIP: 0033:0x7f4efe819bd9 [ 622.608907][T13228] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 622.628433][T13228] RSP: 002b:00007f4efda9b048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 622.636679][T13228] RAX: ffffffffffffffda RBX: 00007f4efe9a7f60 RCX: 00007f4efe819bd9 [ 622.644510][T13228] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000002 [ 622.652298][T13228] RBP: 00007f4efda9b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 622.660112][T13228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 622.667923][T13228] R13: 000000000000000b R14: 00007f4efe9a7f60 R15: 00007ffc56213788 [ 623.371443][T13274] bridge0: port 1(bridge_slave_0) entered disabled state [ 623.415886][T13272] device veth0_vlan left promiscuous mode [ 623.423267][T13272] device veth0_vlan entered promiscuous mode [ 623.431065][T13274] bridge0: port 1(bridge_slave_0) entered blocking state [ 623.437946][T13274] bridge0: port 1(bridge_slave_0) entered forwarding state [ 623.513303][T13285] FAULT_INJECTION: forcing a failure. [ 623.513303][T13285] name failslab, interval 1, probability 0, space 0, times 0 [ 623.564498][T13285] CPU: 0 PID: 13285 Comm: syz.2.4954 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 623.575679][T13285] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 623.585662][T13285] Call Trace: [ 623.588795][T13285] dump_stack_lvl+0x1e2/0x24b [ 623.593303][T13285] ? panic+0x812/0x812 [ 623.597209][T13285] ? bfq_pos_tree_add_move+0x43b/0x43b [ 623.602501][T13285] dump_stack+0x15/0x17 [ 623.606494][T13285] should_fail+0x3c6/0x510 [ 623.610751][T13285] ? security_inode_alloc+0x29/0x120 [ 623.615874][T13285] __should_failslab+0xa4/0xe0 [ 623.620471][T13285] should_failslab+0x9/0x20 [ 623.624816][T13285] kmem_cache_alloc+0x3d/0x2e0 [ 623.629414][T13285] security_inode_alloc+0x29/0x120 [ 623.634356][T13285] inode_init_always+0x767/0x9f0 [ 623.639131][T13285] ? sockfs_init_fs_context+0xb0/0xb0 [ 623.644334][T13285] new_inode_pseudo+0x93/0x220 [ 623.648935][T13285] __sock_create+0x135/0x760 [ 623.653358][T13285] ? get_unused_fd_flags+0x94/0xa0 [ 623.658303][T13285] __sys_socketpair+0x29f/0x6e0 [ 623.662992][T13285] ? __ia32_sys_socket+0x90/0x90 [ 623.667762][T13285] ? __ia32_sys_read+0x90/0x90 [ 623.672363][T13285] __x64_sys_socketpair+0x9b/0xb0 [ 623.677221][T13285] do_syscall_64+0x34/0x70 [ 623.681476][T13285] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 623.687204][T13285] RIP: 0033:0x7f384a6ecbd9 [ 623.691458][T13285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 623.710984][T13285] RSP: 002b:00007f384996e048 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 623.719228][T13285] RAX: ffffffffffffffda RBX: 00007f384a87af60 RCX: 00007f384a6ecbd9 [ 623.727041][T13285] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 000000000000000a [ 623.734850][T13285] RBP: 00007f384996e0a0 R08: 0000000000000000 R09: 0000000000000000 [ 623.742665][T13285] R10: 0000000020000000 R11: 0000000000000246 R12: 0000000000000001 [ 623.750474][T13285] R13: 000000000000000b R14: 00007f384a87af60 R15: 00007fffedf89ff8 [ 623.760122][T13285] socket: no more sockets [ 624.547142][T13341] FAULT_INJECTION: forcing a failure. [ 624.547142][T13341] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 624.666867][T13341] CPU: 0 PID: 13341 Comm: syz.3.4974 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 624.678050][T13341] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 624.687938][T13341] Call Trace: [ 624.691094][T13341] dump_stack_lvl+0x1e2/0x24b [ 624.695584][T13341] ? bfq_pos_tree_add_move+0x43b/0x43b [ 624.700876][T13341] dump_stack+0x15/0x17 [ 624.704872][T13341] should_fail+0x3c6/0x510 [ 624.709127][T13341] should_fail_alloc_page+0x52/0x60 [ 624.714163][T13341] __alloc_pages_nodemask+0x1b3/0xaf0 [ 624.719371][T13341] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 624.724751][T13341] kmalloc_order+0x4c/0x170 [ 624.729086][T13341] kmalloc_order_trace+0x18/0x90 [ 624.733861][T13341] ? alloc_skb_with_frags+0xa1/0x570 [ 624.738982][T13341] __kmalloc_track_caller+0x1dd/0x320 [ 624.744189][T13341] ? __alloc_skb+0x80/0x510 [ 624.748531][T13341] ? alloc_skb_with_frags+0xa1/0x570 [ 624.753640][T13341] __alloc_skb+0xbc/0x510 [ 624.757810][T13341] alloc_skb_with_frags+0xa1/0x570 [ 624.762754][T13341] ? 0xffffffffa0018000 [ 624.766752][T13341] ? is_bpf_text_address+0x172/0x190 [ 624.771872][T13341] ? stack_trace_save+0x1c0/0x1c0 [ 624.776737][T13341] sock_alloc_send_pskb+0x915/0xa50 [ 624.781771][T13341] ? sock_kzfree_s+0x60/0x60 [ 624.786198][T13341] ? stack_trace_snprint+0xf0/0xf0 [ 624.791141][T13341] tun_get_user+0xe90/0x38f0 [ 624.795564][T13341] ? kasan_set_track+0x4b/0x70 [ 624.800162][T13341] ? kasan_set_free_info+0x23/0x40 [ 624.805129][T13341] ? do_syscall_64+0x34/0x70 [ 624.809543][T13341] ? _kstrtoull+0x3a0/0x4a0 [ 624.813881][T13341] ? tun_do_read+0x1f60/0x1f60 [ 624.818477][T13341] ? kstrtouint_from_user+0x20a/0x2a0 [ 624.823687][T13341] ? kstrtol_from_user+0x310/0x310 [ 624.828636][T13341] ? avc_policy_seqno+0x1b/0x70 [ 624.833327][T13341] ? selinux_file_permission+0x2bb/0x560 [ 624.838788][T13341] ? fsnotify_perm+0x67/0x4e0 [ 624.843301][T13341] tun_chr_write_iter+0x1a8/0x250 [ 624.848163][T13341] vfs_write+0xb55/0xe70 [ 624.852243][T13341] ? kernel_write+0x3d0/0x3d0 [ 624.856761][T13341] ? __fdget_pos+0x209/0x3a0 [ 624.861179][T13341] ? ksys_write+0x77/0x2c0 [ 624.865433][T13341] ksys_write+0x199/0x2c0 [ 624.869600][T13341] ? __ia32_sys_read+0x90/0x90 [ 624.874201][T13341] ? debug_smp_processor_id+0x17/0x20 [ 624.879407][T13341] __x64_sys_write+0x7b/0x90 [ 624.883834][T13341] do_syscall_64+0x34/0x70 [ 624.888089][T13341] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 624.893812][T13341] RIP: 0033:0x7f9b01f95bd9 [ 624.898069][T13341] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 624.917516][T13341] RSP: 002b:00007f9b01217048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 624.925754][T13341] RAX: ffffffffffffffda RBX: 00007f9b02123f60 RCX: 00007f9b01f95bd9 [ 624.933567][T13341] RDX: 000000000000fdef RSI: 0000000020000300 RDI: 00000000000000c8 [ 624.941377][T13341] RBP: 00007f9b012170a0 R08: 0000000000000000 R09: 0000000000000000 [ 624.949189][T13341] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 624.957085][T13341] R13: 000000000000000b R14: 00007f9b02123f60 R15: 00007ffc56bdbac8 [ 625.018323][T13342] bridge0: port 1(bridge_slave_0) entered blocking state [ 625.035565][T13342] bridge0: port 1(bridge_slave_0) entered disabled state [ 625.059049][T13342] device bridge_slave_0 entered promiscuous mode [ 625.074947][T13342] bridge0: port 2(bridge_slave_1) entered blocking state [ 625.104635][T13342] bridge0: port 2(bridge_slave_1) entered disabled state [ 625.132924][T13342] device bridge_slave_1 entered promiscuous mode [ 625.307713][T13342] bridge0: port 2(bridge_slave_1) entered blocking state [ 625.314577][T13342] bridge0: port 2(bridge_slave_1) entered forwarding state [ 625.321685][T13342] bridge0: port 1(bridge_slave_0) entered blocking state [ 625.328466][T13342] bridge0: port 1(bridge_slave_0) entered forwarding state [ 625.343523][ T20] bridge0: port 1(bridge_slave_0) entered disabled state [ 625.350895][ T20] bridge0: port 2(bridge_slave_1) entered disabled state [ 625.385629][ T2173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 625.394858][ T2173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 625.436078][ T2173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 625.447474][ T2173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 625.455638][ T2173] bridge0: port 1(bridge_slave_0) entered blocking state [ 625.462501][ T2173] bridge0: port 1(bridge_slave_0) entered forwarding state [ 625.483411][ T2173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 625.493963][ T2173] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 625.502334][ T2173] bridge0: port 2(bridge_slave_1) entered blocking state [ 625.509190][ T2173] bridge0: port 2(bridge_slave_1) entered forwarding state [ 625.610188][T13370] bridge0: port 1(bridge_slave_0) entered blocking state [ 625.617098][T13370] bridge0: port 1(bridge_slave_0) entered disabled state [ 625.624314][T13370] device bridge_slave_0 entered promiscuous mode [ 625.632295][ T2173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 625.640400][ T2173] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 625.648319][ T2173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 625.656203][ T2173] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 625.668141][T13370] bridge0: port 2(bridge_slave_1) entered blocking state [ 625.677664][T13370] bridge0: port 2(bridge_slave_1) entered disabled state [ 625.684898][T13370] device bridge_slave_1 entered promiscuous mode [ 625.702557][T13384] cgroup: fork rejected by pids controller in /syz1 [ 625.740399][T13295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 625.748857][T13295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 625.777770][ T5599] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 625.785552][ T5599] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 625.795657][T13295] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 625.803076][T13295] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 625.811816][T13342] device veth0_vlan entered promiscuous mode [ 625.823778][T13342] device veth1_macvtap entered promiscuous mode [ 625.832957][ T1838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 625.841946][ T1838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 625.850387][ T1838] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 625.883146][T13054] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 625.897101][T13054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 625.933029][T13054] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 625.958602][T13054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 626.061392][T13395] bridge0: port 1(bridge_slave_0) entered blocking state [ 626.074947][T13395] bridge0: port 1(bridge_slave_0) entered disabled state [ 626.082683][T13395] device bridge_slave_0 entered promiscuous mode [ 626.127801][T13395] bridge0: port 2(bridge_slave_1) entered blocking state [ 626.145979][T13395] bridge0: port 2(bridge_slave_1) entered disabled state [ 626.155168][T13395] device bridge_slave_1 entered promiscuous mode [ 626.163568][T13295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 626.172584][T13295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 626.180641][T13295] bridge0: port 1(bridge_slave_0) entered blocking state [ 626.187490][T13295] bridge0: port 1(bridge_slave_0) entered forwarding state [ 626.197449][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 626.209649][T13411] device pim6reg1 entered promiscuous mode [ 626.224760][T11128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 626.232779][T11128] bridge0: port 2(bridge_slave_1) entered blocking state [ 626.239619][T11128] bridge0: port 2(bridge_slave_1) entered forwarding state [ 626.283311][ T1838] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 626.291498][ T1838] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 626.392302][T13054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 626.416623][T13370] device veth0_vlan entered promiscuous mode [ 626.428098][ T1838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 626.435960][ T1838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 626.454497][T13370] device veth1_macvtap entered promiscuous mode [ 626.461211][ T1838] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 626.469049][ T1838] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 626.476519][ T1838] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 626.484955][ T1838] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 626.493288][ T1838] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 626.532141][T13054] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 626.541345][T13054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 626.551028][T13054] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 626.559143][T13054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 626.601016][T13436] FAULT_INJECTION: forcing a failure. [ 626.601016][T13436] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 626.613993][T13436] CPU: 0 PID: 13436 Comm: syz.3.4985 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 626.625158][T13436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 626.635050][T13436] Call Trace: [ 626.638185][T13436] dump_stack_lvl+0x1e2/0x24b [ 626.642693][T13436] ? bfq_pos_tree_add_move+0x43b/0x43b [ 626.647988][T13436] dump_stack+0x15/0x17 [ 626.651979][T13436] should_fail+0x3c6/0x510 [ 626.656234][T13436] should_fail_usercopy+0x1a/0x20 [ 626.661089][T13436] _copy_to_user+0x20/0x90 [ 626.665342][T13436] simple_read_from_buffer+0xc7/0x150 [ 626.670551][T13436] proc_fail_nth_read+0x1a3/0x210 [ 626.675412][T13436] ? security_file_permission+0x7b/0xb0 [ 626.680791][T13436] ? proc_fault_inject_write+0x390/0x390 [ 626.686259][T13436] ? security_file_permission+0x86/0xb0 [ 626.691646][T13436] ? rw_verify_area+0x1c3/0x360 [ 626.696332][T13436] ? proc_fault_inject_write+0x390/0x390 [ 626.701888][T13436] vfs_read+0x204/0xbb0 [ 626.705881][T13436] ? put_unused_fd+0x16c/0x1b0 [ 626.710478][T13436] ? kernel_read+0x70/0x70 [ 626.714730][T13436] ? __kasan_check_write+0x14/0x20 [ 626.719674][T13436] ? mutex_lock+0xa5/0x110 [ 626.723928][T13436] ? mutex_trylock+0xa0/0xa0 [ 626.728361][T13436] ? __fdget_pos+0x2e7/0x3a0 [ 626.732780][T13436] ? ksys_read+0x77/0x2c0 [ 626.736953][T13436] ksys_read+0x199/0x2c0 [ 626.741035][T13436] ? vfs_write+0xe70/0xe70 [ 626.745290][T13436] ? debug_smp_processor_id+0x17/0x20 [ 626.750529][T13436] __x64_sys_read+0x7b/0x90 [ 626.754827][T13436] do_syscall_64+0x34/0x70 [ 626.759094][T13436] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 626.764809][T13436] RIP: 0033:0x7f9f2d5ca6bc [ 626.766121][ T24] audit: type=1400 audit(1720447294.109:139): avc: denied { create } for pid=13431 comm="syz.2.5007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netrom_socket permissive=1 [ 626.769055][T13436] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48 [ 626.769062][T13436] RSP: 002b:00007f9f2c84d040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 626.769076][T13436] RAX: ffffffffffffffda RBX: 00007f9f2d759f60 RCX: 00007f9f2d5ca6bc [ 626.769083][T13436] RDX: 000000000000000f RSI: 00007f9f2c84d0b0 RDI: 0000000000000005 [ 626.769089][T13436] RBP: 00007f9f2c84d0a0 R08: 0000000000000000 R09: 0000000000000000 [ 626.769096][T13436] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 626.769102][T13436] R13: 000000000000000b R14: 00007f9f2d759f60 R15: 00007fffa1358db8 [ 626.889536][T13054] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 626.897324][T13054] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 626.956803][T13295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 626.965013][T13295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 626.973143][T13295] bridge0: port 1(bridge_slave_0) entered blocking state [ 626.980003][T13295] bridge0: port 1(bridge_slave_0) entered forwarding state [ 626.987452][T13295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 626.995541][T13295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 627.003639][T13295] bridge0: port 2(bridge_slave_1) entered blocking state [ 627.010478][T13295] bridge0: port 2(bridge_slave_1) entered forwarding state [ 627.076515][T11128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 627.085513][T13446] device pim6reg1 entered promiscuous mode [ 627.157715][ T2175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 627.165530][ T2175] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 627.173603][ T2175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 627.181440][ T2175] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 627.189523][ T2175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 627.197824][ T2175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 627.213342][T13430] bridge0: port 1(bridge_slave_0) entered blocking state [ 627.221760][T13430] bridge0: port 1(bridge_slave_0) entered disabled state [ 627.229062][T13430] device bridge_slave_0 entered promiscuous mode [ 627.238246][T13395] device veth0_vlan entered promiscuous mode [ 627.247248][ T2175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 627.255178][ T2175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 627.263719][ T2175] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 627.271296][ T2175] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 627.278762][T13430] bridge0: port 2(bridge_slave_1) entered blocking state [ 627.285905][T13430] bridge0: port 2(bridge_slave_1) entered disabled state [ 627.293362][T13430] device bridge_slave_1 entered promiscuous mode [ 627.303206][T13395] device veth1_macvtap entered promiscuous mode [ 627.317746][T13053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 627.370299][ T2175] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 627.386706][ T2175] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 627.395493][ T2175] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 627.403741][ T2175] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 627.511666][ T48] device bridge_slave_1 left promiscuous mode [ 627.517801][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 627.525037][ T48] device bridge_slave_0 left promiscuous mode [ 627.531275][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 627.538869][ T48] device bridge_slave_1 left promiscuous mode [ 627.544854][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 627.552102][ T48] device bridge_slave_0 left promiscuous mode [ 627.558216][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 627.565856][ T48] device bridge_slave_1 left promiscuous mode [ 627.571901][ T48] bridge0: port 2(bridge_slave_1) entered disabled state [ 627.579225][ T48] bridge0: port 1(bridge_slave_0) entered disabled state [ 627.587137][ T48] device veth1_macvtap left promiscuous mode [ 627.593036][ T48] device veth1_macvtap left promiscuous mode [ 627.598851][ T48] device veth0_vlan left promiscuous mode [ 627.604592][ T48] device veth1_macvtap left promiscuous mode [ 627.855100][T13466] bridge0: port 1(bridge_slave_0) entered blocking state [ 627.862252][T13466] bridge0: port 1(bridge_slave_0) entered disabled state [ 627.869686][T13466] device bridge_slave_0 entered promiscuous mode [ 627.893995][T13466] bridge0: port 2(bridge_slave_1) entered blocking state [ 627.902191][T13466] bridge0: port 2(bridge_slave_1) entered disabled state [ 627.909987][T13466] device bridge_slave_1 entered promiscuous mode [ 627.921611][T11128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 627.929116][T11128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 627.951708][T13295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 627.959849][T13295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 627.968034][T13295] bridge0: port 1(bridge_slave_0) entered blocking state [ 627.974855][T13295] bridge0: port 1(bridge_slave_0) entered forwarding state [ 627.984335][T11128] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 627.993040][T13483] device pim6reg1 entered promiscuous mode [ 628.016588][T13295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 628.025482][T13295] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 628.033592][T13295] bridge0: port 2(bridge_slave_1) entered blocking state [ 628.040431][T13295] bridge0: port 2(bridge_slave_1) entered forwarding state [ 628.058617][T13477] bridge0: port 1(bridge_slave_0) entered blocking state [ 628.065458][T13477] bridge0: port 1(bridge_slave_0) entered disabled state [ 628.073414][T13477] device bridge_slave_0 entered promiscuous mode [ 628.083921][T11128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 628.091902][T11128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 628.100083][T11128] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 628.108293][T11128] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 628.124770][T13477] bridge0: port 2(bridge_slave_1) entered blocking state [ 628.131798][T13477] bridge0: port 2(bridge_slave_1) entered disabled state [ 628.139291][T13477] device bridge_slave_1 entered promiscuous mode [ 628.198900][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 628.208098][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 628.215798][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 628.223770][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 628.231841][ T999] bridge0: port 1(bridge_slave_0) entered blocking state [ 628.238677][ T999] bridge0: port 1(bridge_slave_0) entered forwarding state [ 628.245970][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 628.254023][ T999] bridge0: port 2(bridge_slave_1) entered blocking state [ 628.260883][ T999] bridge0: port 2(bridge_slave_1) entered forwarding state [ 628.268300][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 628.283503][T11128] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 628.334040][T13430] device veth0_vlan entered promiscuous mode [ 628.342816][ T5597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 628.350955][ T5597] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 628.358551][ T5597] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 628.366416][ T5597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 628.392990][T13430] device veth1_macvtap entered promiscuous mode [ 628.403133][ T5597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 628.465753][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 628.477651][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 628.486023][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 628.541857][T13501] FAULT_INJECTION: forcing a failure. [ 628.541857][T13501] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 628.602552][T13501] CPU: 1 PID: 13501 Comm: syz.4.5005 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 628.613729][T13501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 628.615269][ T999] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 628.623618][T13501] Call Trace: [ 628.623639][T13501] dump_stack_lvl+0x1e2/0x24b [ 628.623652][T13501] ? bfq_pos_tree_add_move+0x43b/0x43b [ 628.623677][T13501] ? gfp_zone+0x46/0x160 [ 628.648541][T13501] dump_stack+0x15/0x17 [ 628.652537][T13501] should_fail+0x3c6/0x510 [ 628.656782][T13501] should_fail_alloc_page+0x52/0x60 [ 628.661813][T13501] __alloc_pages_nodemask+0x1b3/0xaf0 [ 628.667024][T13501] ? __get_user_nocheck_8+0x6/0x13 [ 628.671977][T13501] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 628.677357][T13501] ? __irq_exit_rcu+0x40/0x150 [ 628.681952][T13501] ? __get_user_nocheck_8+0x6/0x13 [ 628.686894][T13501] shmem_alloc_page+0x257/0x420 [ 628.691576][T13501] ? put_page+0xd0/0xd0 [ 628.695565][T13501] ? sched_clock_cpu+0x1b/0x3b0 [ 628.700272][T13501] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 628.706336][T13501] shmem_alloc_and_acct_page+0x395/0x8e0 [ 628.711802][T13501] ? shmem_swapin_page+0x1950/0x1950 [ 628.716986][T13501] ? sched_clock_cpu+0x1b/0x3b0 [ 628.721624][T13501] ? sched_clock+0x3a/0x40 [ 628.725973][T13501] ? __irq_exit_rcu+0x40/0x150 [ 628.730612][T13501] ? irq_exit_rcu+0x9/0x10 [ 628.734819][T13501] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 628.740475][T13501] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 628.746443][T13501] ? shmem_getpage_gfp+0x77b/0x2480 [ 628.751490][T13501] ? shmem_getpage_gfp+0x821/0x2480 [ 628.756535][T13501] shmem_getpage_gfp+0x891/0x2480 [ 628.761376][T13501] ? shmem_getpage+0xa0/0xa0 [ 628.765796][T13501] ? _raw_spin_lock+0xa4/0x1b0 [ 628.770397][T13501] ? _raw_spin_trylock_bh+0x190/0x190 [ 628.775604][T13501] shmem_fallocate+0x9a5/0xe90 [ 628.780238][T13501] ? shmem_mmap+0x270/0x270 [ 628.784541][T13501] ? __irq_exit_rcu+0x40/0x150 [ 628.789143][T13501] ? irq_exit_rcu+0x9/0x10 [ 628.793409][T13501] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 628.799047][T13501] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 628.805028][T13501] ? vfs_fallocate+0x308/0x570 [ 628.809626][T13501] ? file_start_write+0x104/0x180 [ 628.814487][T13501] ? shmem_fallocate+0x1/0xe90 [ 628.819085][T13501] vfs_fallocate+0x492/0x570 [ 628.823512][T13501] do_vfs_ioctl+0x1686/0x1a30 [ 628.828025][T13501] ? ioctl_has_perm+0x3f0/0x560 [ 628.832709][T13501] ? __x32_compat_sys_ioctl+0x90/0x90 [ 628.838009][T13501] ? has_cap_mac_admin+0x3c0/0x3c0 [ 628.842967][T13501] ? selinux_file_ioctl+0x3cc/0x540 [ 628.847990][T13501] ? clockevents_program_event+0x214/0x2c0 [ 628.853628][T13501] ? selinux_file_alloc_security+0x120/0x120 [ 628.859447][T13501] ? __fget_files+0x31e/0x380 [ 628.863959][T13501] ? security_file_ioctl+0x84/0xb0 [ 628.868908][T13501] __se_sys_ioctl+0x99/0x190 [ 628.873332][T13501] __x64_sys_ioctl+0x7b/0x90 [ 628.877757][T13501] do_syscall_64+0x34/0x70 [ 628.882033][T13501] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 628.887919][T13501] RIP: 0033:0x7f1b9dd29bd9 [ 628.892167][T13501] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 628.911613][T13501] RSP: 002b:00007f1b9cfab048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 628.919852][T13501] RAX: ffffffffffffffda RBX: 00007f1b9deb7f60 RCX: 00007f1b9dd29bd9 [ 628.927666][T13501] RDX: 0000000020000040 RSI: 000000004030582a RDI: 0000000000000006 [ 628.935478][T13501] RBP: 00007f1b9cfab0a0 R08: 0000000000000000 R09: 0000000000000000 [ 628.943286][T13501] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 628.951098][T13501] R13: 000000000000000b R14: 00007f1b9deb7f60 R15: 00007ffca5fc3ed8 [ 628.967879][T13466] device veth0_vlan entered promiscuous mode [ 628.996934][ T5598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 629.005809][ T5598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 629.015461][ T5598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 629.028053][ T5598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 629.035221][ T5598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 629.043563][ T5598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 629.051604][ T5598] bridge0: port 1(bridge_slave_0) entered blocking state [ 629.058450][ T5598] bridge0: port 1(bridge_slave_0) entered forwarding state [ 629.065590][ T5598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 629.074271][ T5598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 629.082478][ T5598] bridge0: port 2(bridge_slave_1) entered blocking state [ 629.089332][ T5598] bridge0: port 2(bridge_slave_1) entered forwarding state [ 629.097274][ T5598] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 629.104448][ T5598] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 629.111738][ T5598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 629.141325][T13053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 629.162125][T13053] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 629.170595][T13053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 629.178675][T13053] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 629.186455][T13053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 629.194963][T13053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 629.262805][T13466] device veth1_macvtap entered promiscuous mode [ 629.340783][ T2456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 629.348650][ T2456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 629.368101][ T2456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 629.376206][ T2456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 629.384600][ T2456] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 629.394730][T13477] device veth0_vlan entered promiscuous mode [ 629.418337][ T2456] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 629.426658][ T2456] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 629.434222][ T2456] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 629.443035][ T2456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 629.451950][ T2456] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 629.460456][ T2456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 629.490461][T13477] device veth1_macvtap entered promiscuous mode [ 629.507926][ T2173] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 629.542728][ T2173] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 629.560886][ T2173] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 629.570683][T13527] FAULT_INJECTION: forcing a failure. [ 629.570683][T13527] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 629.583579][T13527] CPU: 0 PID: 13527 Comm: syz.4.5037 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 629.594703][T13527] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 629.604593][T13527] Call Trace: [ 629.607923][T13527] dump_stack_lvl+0x1e2/0x24b [ 629.612426][T13527] ? bfq_pos_tree_add_move+0x43b/0x43b [ 629.617717][T13527] dump_stack+0x15/0x17 [ 629.621725][T13527] should_fail+0x3c6/0x510 [ 629.625955][T13527] should_fail_usercopy+0x1a/0x20 [ 629.630822][T13527] _copy_to_user+0x20/0x90 [ 629.635072][T13527] simple_read_from_buffer+0xc7/0x150 [ 629.640278][T13527] proc_fail_nth_read+0x1a3/0x210 [ 629.645139][T13527] ? security_file_permission+0x7b/0xb0 [ 629.650522][T13527] ? proc_fault_inject_write+0x390/0x390 [ 629.655986][T13527] ? security_file_permission+0x86/0xb0 [ 629.661366][T13527] ? rw_verify_area+0x1c3/0x360 [ 629.666052][T13527] ? proc_fault_inject_write+0x390/0x390 [ 629.671526][T13527] vfs_read+0x204/0xbb0 [ 629.675515][T13527] ? kernel_read+0x70/0x70 [ 629.679768][T13527] ? __kasan_check_write+0x14/0x20 [ 629.684712][T13527] ? mutex_lock+0xa5/0x110 [ 629.688965][T13527] ? mutex_trylock+0xa0/0xa0 [ 629.693396][T13527] ? __fdget_pos+0x2e7/0x3a0 [ 629.697817][T13527] ? ksys_read+0x77/0x2c0 [ 629.701982][T13527] ksys_read+0x199/0x2c0 [ 629.706065][T13527] ? vfs_write+0xe70/0xe70 [ 629.710321][T13527] ? debug_smp_processor_id+0x17/0x20 [ 629.715523][T13527] __x64_sys_read+0x7b/0x90 [ 629.719864][T13527] do_syscall_64+0x34/0x70 [ 629.724117][T13527] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 629.729850][T13527] RIP: 0033:0x7f1b9dd286bc [ 629.734101][T13527] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48 [ 629.753541][T13527] RSP: 002b:00007f1b9cfab040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 629.761784][T13527] RAX: ffffffffffffffda RBX: 00007f1b9deb7f60 RCX: 00007f1b9dd286bc [ 629.769594][T13527] RDX: 000000000000000f RSI: 00007f1b9cfab0b0 RDI: 0000000000000007 [ 629.777492][T13527] RBP: 00007f1b9cfab0a0 R08: 0000000000000000 R09: 0000000000000000 [ 629.785303][T13527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 629.793116][T13527] R13: 000000000000000b R14: 00007f1b9deb7f60 R15: 00007ffca5fc3ed8 [ 629.821416][ T2456] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 629.829993][ T2456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 629.838808][ T2456] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 629.847157][ T2456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 630.060796][T13550] device veth1_macvtap left promiscuous mode [ 630.354107][T13560] device syzkaller0 entered promiscuous mode [ 630.958066][ T2346] device bridge_slave_1 left promiscuous mode [ 630.963978][ T2346] bridge0: port 2(bridge_slave_1) entered disabled state [ 630.971404][ T2346] device bridge_slave_0 left promiscuous mode [ 630.977422][ T2346] bridge0: port 1(bridge_slave_0) entered disabled state [ 630.984791][ T2346] device bridge_slave_1 left promiscuous mode [ 630.990775][ T2346] bridge0: port 2(bridge_slave_1) entered disabled state [ 630.997813][ T2346] device bridge_slave_0 left promiscuous mode [ 631.003697][ T2346] bridge0: port 1(bridge_slave_0) entered disabled state [ 631.011858][ T2346] device bridge_slave_1 left promiscuous mode [ 631.017896][ T2346] bridge0: port 2(bridge_slave_1) entered disabled state [ 631.025014][ T2346] device bridge_slave_0 left promiscuous mode [ 631.031225][ T2346] bridge0: port 1(bridge_slave_0) entered disabled state [ 631.039046][ T2346] device veth1_macvtap left promiscuous mode [ 631.044835][ T2346] device veth0_vlan left promiscuous mode [ 631.050599][ T2346] device veth1_macvtap left promiscuous mode [ 631.056404][ T2346] device veth0_vlan left promiscuous mode [ 631.062251][ T2346] device veth1_macvtap left promiscuous mode [ 631.068128][ T2346] device veth0_vlan left promiscuous mode [ 631.345532][T13574] bridge0: port 1(bridge_slave_0) entered blocking state [ 631.352404][T13574] bridge0: port 1(bridge_slave_0) entered disabled state [ 631.359903][T13574] device bridge_slave_0 entered promiscuous mode [ 631.366690][T13574] bridge0: port 2(bridge_slave_1) entered blocking state [ 631.373668][T13574] bridge0: port 2(bridge_slave_1) entered disabled state [ 631.380898][T13574] device bridge_slave_1 entered promiscuous mode SYZFAIL: proc resp pipe read failed n=-1 (errno 11: Resource temporarily unavailable) [ 631.413289][T13574] bridge0: port 2(bridge_slave_1) entered blocking state [ 631.420138][T13574] bridge0: port 2(bridge_slave_1) entered forwarding state [ 631.427244][T13574] bridge0: port 1(bridge_slave_0) entered blocking state [ 631.434028][T13574] bridge0: port 1(bridge_slave_0) entered forwarding state [ 631.524340][T13579] bridge0: port 1(bridge_slave_0) entered blocking state [ 631.531433][T13579] bridge0: port 1(bridge_slave_0) entered disabled state [ 631.538812][T13579] device bridge_slave_0 entered promiscuous mode [ 631.545709][T13579] bridge0: port 2(bridge_slave_1) entered blocking state [ 631.552816][T13579] bridge0: port 2(bridge_slave_1) entered disabled state [ 631.559970][T13579] device bridge_slave_1 entered promiscuous mode [ 631.593222][T13579] bridge0: port 2(bridge_slave_1) entered blocking state [ 631.600077][T13579] bridge0: port 2(bridge_slave_1) entered forwarding state [ 631.607171][T13579] bridge0: port 1(bridge_slave_0) entered blocking state [ 631.613942][T13579] bridge0: port 1(bridge_slave_0) entered forwarding state [ 631.631563][T13050] bridge0: port 1(bridge_slave_0) entered disabled state [ 631.639291][T13050] bridge0: port 2(bridge_slave_1) entered disabled state [ 631.646433][T13050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 631.654520][T13050] bridge0: port 1(bridge_slave_0) entered disabled state [ 631.661880][T13050] bridge0: port 2(bridge_slave_1) entered disabled state [ 631.670704][ T5597] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 631.678676][ T5597] bridge0: port 1(bridge_slave_0) entered blocking state [ 631.685490][ T5597] bridge0: port 1(bridge_slave_0) entered forwarding state [ 631.703775][T13579] device veth0_vlan entered promiscuous mode [ 631.710662][T13050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 631.719254][T13050] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 631.727282][T13050] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 631.734472][T13050] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 631.741693][T13050] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 631.749628][T13050] bridge0: port 2(bridge_slave_1) entered blocking state [ 631.756438][T13050] bridge0: port 2(bridge_slave_1) entered forwarding state [ 631.763794][T13050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 631.771789][T13050] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 631.783920][T13579] device veth1_macvtap entered promiscuous mode [ 631.790877][ T2456] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 631.802616][ T5597] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 631.814010][ T2456] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 633.247916][ T2346] device bridge_slave_1 left promiscuous mode [ 633.253832][ T2346] bridge0: port 2(bridge_slave_1) entered disabled state [ 633.261214][ T2346] device bridge_slave_0 left promiscuous mode [ 633.267276][ T2346] bridge0: port 1(bridge_slave_0) entered disabled state [ 633.274574][ T2346] device bridge_slave_1 left promiscuous mode [ 633.280537][ T2346] bridge0: port 2(bridge_slave_1) entered disabled state [ 633.287555][ T2346] device bridge_slave_0 left promiscuous mode [ 633.293442][ T2346] bridge0: port 1(bridge_slave_0) entered disabled state [ 633.301047][ T2346] device bridge_slave_1 left promiscuous mode [ 633.307150][ T2346] bridge0: port 2(bridge_slave_1) entered disabled state [ 633.314360][ T2346] device bridge_slave_0 left promiscuous mode [ 633.320702][ T2346] bridge0: port 1(bridge_slave_0) entered disabled state [ 633.328421][ T2346] device bridge_slave_1 left promiscuous mode [ 633.334319][ T2346] bridge0: port 2(bridge_slave_1) entered disabled state [ 633.341980][ T2346] device bridge_slave_0 left promiscuous mode [ 633.347970][ T2346] bridge0: port 1(bridge_slave_0) entered disabled state [ 633.355297][ T2346] device bridge_slave_1 left promiscuous mode [ 633.361270][ T2346] bridge0: port 2(bridge_slave_1) entered disabled state [ 633.368344][ T2346] device bridge_slave_0 left promiscuous mode [ 633.374231][ T2346] bridge0: port 1(bridge_slave_0) entered disabled state [ 633.381898][ T2346] device bridge_slave_1 left promiscuous mode [ 633.388053][ T2346] bridge0: port 2(bridge_slave_1) entered disabled state [ 633.395170][ T2346] device bridge_slave_0 left promiscuous mode [ 633.401212][ T2346] bridge0: port 1(bridge_slave_0) entered disabled state [ 633.408696][ T2346] device bridge_slave_1 left promiscuous mode [ 633.414599][ T2346] bridge0: port 2(bridge_slave_1) entered disabled state [ 633.421808][ T2346] device bridge_slave_0 left promiscuous mode [ 633.427847][ T2346] bridge0: port 1(bridge_slave_0) entered disabled state [ 633.435873][ T2346] device veth1_macvtap left promiscuous mode [ 633.441835][ T2346] device veth0_vlan left promiscuous mode [ 633.447572][ T2346] device veth0_vlan left promiscuous mode [ 633.453197][ T2346] device veth1_macvtap left promiscuous mode [ 633.459006][ T2346] device veth0_vlan left promiscuous mode [ 633.464576][ T2346] device veth1_macvtap left promiscuous mode [ 633.470492][ T2346] device veth0_vlan left promiscuous mode [ 633.476121][ T2346] device veth1_macvtap left promiscuous mode [ 633.482206][ T2346] device veth1_macvtap left promiscuous mode [ 633.488150][ T2346] device veth0_vlan left promiscuous mode