last executing test programs: 31.455179413s ago: executing program 1 (id=6149): socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x108c02}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="1800ed594e39a4206d8b25454e21a053c2e20000200000000000000000000000a16b19afda1f7878845ab60be64ee1f308dccee7fc1526875115b396ca632b4029a801121c8e3c70f3fb07c3ca62e1ec2ae46f7e4b21c7adb25fa5f661f2ae85e14e1190e94728464438cb8e8f42b22f8890f6a44f8749743838bcea862cc73e36d1de8862415b917a090dd5958a4b506248d5568e60354987c5c7c10ebd9352708c6bda7f18820c23a911432de304ef7cf6b5add6732ea87171f0e57412d022acc7ed5d3004fcf7"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x10, &(0x7f0000000040), 0x4) sendmsg$unix(r2, &(0x7f0000000640)={&(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000001280)='\\', 0xffffffe3}], 0x1}, 0x24004044) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000abd92de000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x24bdb) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="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"/287], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0}, 0xa2) 27.519783694s ago: executing program 1 (id=6149): socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x108c02}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="1800ed594e39a4206d8b25454e21a053c2e20000200000000000000000000000a16b19afda1f7878845ab60be64ee1f308dccee7fc1526875115b396ca632b4029a801121c8e3c70f3fb07c3ca62e1ec2ae46f7e4b21c7adb25fa5f661f2ae85e14e1190e94728464438cb8e8f42b22f8890f6a44f8749743838bcea862cc73e36d1de8862415b917a090dd5958a4b506248d5568e60354987c5c7c10ebd9352708c6bda7f18820c23a911432de304ef7cf6b5add6732ea87171f0e57412d022acc7ed5d3004fcf7"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x10, &(0x7f0000000040), 0x4) sendmsg$unix(r2, &(0x7f0000000640)={&(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000001280)='\\', 0xffffffe3}], 0x1}, 0x24004044) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000abd92de000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x24bdb) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="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"/287], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0}, 0xa2) 21.166304862s ago: executing program 1 (id=6149): socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x108c02}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="1800ed594e39a4206d8b25454e21a053c2e20000200000000000000000000000a16b19afda1f7878845ab60be64ee1f308dccee7fc1526875115b396ca632b4029a801121c8e3c70f3fb07c3ca62e1ec2ae46f7e4b21c7adb25fa5f661f2ae85e14e1190e94728464438cb8e8f42b22f8890f6a44f8749743838bcea862cc73e36d1de8862415b917a090dd5958a4b506248d5568e60354987c5c7c10ebd9352708c6bda7f18820c23a911432de304ef7cf6b5add6732ea87171f0e57412d022acc7ed5d3004fcf7"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x10, &(0x7f0000000040), 0x4) sendmsg$unix(r2, &(0x7f0000000640)={&(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000001280)='\\', 0xffffffe3}], 0x1}, 0x24004044) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000abd92de000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x24bdb) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000010000000000000000000000950000000000000046682d562c31aa909594c57a164463536e83a7f6ac12a8b52f0d70aa97a91fa46cdcefe7534fda04cace652409e818c0b1da96d9c9fa8e9523840100cbac3c07c3db6bc11fa42d9ca632c33ca9a00987000000002cd50db1486b80ee61ff6ddaa4bf0609a8ef7fd07f4c556489cf61cf8e63e826fff67d3299ca9f9b85cdcd75b85bb1775f4ff03b75aa7b6aa1a7e9a2b91d103d541bce370d9e6810dec2fe8300dc5edf3f6aa43810579aedb7e19fbacb5bd5e5337b507559ca6acc6471ecad2746ab01526ace07000000c1ea01c13a2406007d0efb7e91a9dbde2353f035347270d076c93f1b1a810cb2c7d72ee9ce76e6da15600893bc36f6502f00"/287], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0}, 0xa2) 15.159140463s ago: executing program 1 (id=6149): socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x108c02}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="1800ed594e39a4206d8b25454e21a053c2e20000200000000000000000000000a16b19afda1f7878845ab60be64ee1f308dccee7fc1526875115b396ca632b4029a801121c8e3c70f3fb07c3ca62e1ec2ae46f7e4b21c7adb25fa5f661f2ae85e14e1190e94728464438cb8e8f42b22f8890f6a44f8749743838bcea862cc73e36d1de8862415b917a090dd5958a4b506248d5568e60354987c5c7c10ebd9352708c6bda7f18820c23a911432de304ef7cf6b5add6732ea87171f0e57412d022acc7ed5d3004fcf7"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x10, &(0x7f0000000040), 0x4) sendmsg$unix(r2, &(0x7f0000000640)={&(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000001280)='\\', 0xffffffe3}], 0x1}, 0x24004044) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000abd92de000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x24bdb) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="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"/287], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0}, 0xa2) 9.468767457s ago: executing program 1 (id=6149): socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x108c02}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="1800ed594e39a4206d8b25454e21a053c2e20000200000000000000000000000a16b19afda1f7878845ab60be64ee1f308dccee7fc1526875115b396ca632b4029a801121c8e3c70f3fb07c3ca62e1ec2ae46f7e4b21c7adb25fa5f661f2ae85e14e1190e94728464438cb8e8f42b22f8890f6a44f8749743838bcea862cc73e36d1de8862415b917a090dd5958a4b506248d5568e60354987c5c7c10ebd9352708c6bda7f18820c23a911432de304ef7cf6b5add6732ea87171f0e57412d022acc7ed5d3004fcf7"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x10, &(0x7f0000000040), 0x4) sendmsg$unix(r2, &(0x7f0000000640)={&(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000001280)='\\', 0xffffffe3}], 0x1}, 0x24004044) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000abd92de000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x24bdb) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="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"/287], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0}, 0xa2) 8.519246585s ago: executing program 4 (id=6338): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0xfff, 0x5, 0x82e, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x40000000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r2}, &(0x7f0000000080), &(0x7f00000001c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000900)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000840)={{r5}, &(0x7f00000004c0), &(0x7f00000003c0)=r6}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x5d) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpid() socketpair$unix(0x1, 0x0, 0x0, 0x0) gettid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000140)={'pim6reg1\x00', 0x1}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000640)='console\x00'}, 0x10) sendmsg$tipc(r1, &(0x7f0000004440)={&(0x7f0000000ec0)=@id, 0x10, 0x0}, 0x0) 8.391599856s ago: executing program 4 (id=6340): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x10002, 0xe5, 0x1, 0x88, 0xffffffffffffffff, 0x8, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x0, 0x4, 0xf}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r0, &(0x7f0000000080), &(0x7f0000001540)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff64, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r1, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x17, 0xc, &(0x7f0000000040)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x0, 0x10001, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, &(0x7f0000000080), 0x0}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x19, 0x0, 0x0, 0x8000, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r6}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r8}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 8.288339134s ago: executing program 4 (id=6342): socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x108c02}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="1800ed594e39a4206d8b25454e21a053c2e20000200000000000000000000000a16b19afda1f7878845ab60be64ee1f308dccee7fc1526875115b396ca632b4029a801121c8e3c70f3fb07c3ca62e1ec2ae46f7e4b21c7adb25fa5f661f2ae85e14e1190e94728464438cb8e8f42b22f8890f6a44f8749743838bcea862cc73e36d1de8862415b917a090dd5958a4b506248d5568e60354987c5c7c10ebd9352708c6bda7f18820c23a911432de304ef7cf6b5add6732ea87171f0e57412d022acc7ed5d3004fcf7"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x10, &(0x7f0000000040), 0x4) sendmsg$unix(r2, &(0x7f0000000640)={&(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000001280)='\\', 0xffffffe3}], 0x1}, 0x24004044) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000abd92de000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="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"/287], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0}, 0xa2) 3.819622808s ago: executing program 0 (id=6369): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040), &(0x7f0000000240)=[0x0, 0x0, 0x0], 0x0, 0x76, &(0x7f0000000480)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x21, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0}, 0xa2) 3.819238648s ago: executing program 0 (id=6370): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000180)={'syzkaller0\x00', 0x7101}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000700), 0x8) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r4, 0x40042409, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@bloom_filter={0x1e, 0x7fffffff, 0x4, 0x7, 0x1006, r0, 0x9, '\x00', 0x0, r4, 0x5, 0x2, 0x4}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{}, &(0x7f00000005c0), 0x0}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000c40)={0xffffffffffffffff, 0xe0, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f00000009c0)=[0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, &(0x7f0000000a80), 0x0, 0x0, 0x8b, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d00)={{}, &(0x7f0000000c80), 0x0}, 0x20) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f00000000c0)={'syzkaller0\x00', @broadcast}) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000002280)={'syzkaller0\x00'}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) close(r1) 3.602560196s ago: executing program 1 (id=6149): socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x108c02}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="1800ed594e39a4206d8b25454e21a053c2e20000200000000000000000000000a16b19afda1f7878845ab60be64ee1f308dccee7fc1526875115b396ca632b4029a801121c8e3c70f3fb07c3ca62e1ec2ae46f7e4b21c7adb25fa5f661f2ae85e14e1190e94728464438cb8e8f42b22f8890f6a44f8749743838bcea862cc73e36d1de8862415b917a090dd5958a4b506248d5568e60354987c5c7c10ebd9352708c6bda7f18820c23a911432de304ef7cf6b5add6732ea87171f0e57412d022acc7ed5d3004fcf7"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x10, &(0x7f0000000040), 0x4) sendmsg$unix(r2, &(0x7f0000000640)={&(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000001280)='\\', 0xffffffe3}], 0x1}, 0x24004044) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000abd92de000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x24bdb) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="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"/287], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0}, 0xa2) 2.675789782s ago: executing program 0 (id=6372): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0xffffffffffffffbc, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000000000000100000001"], 0xfdef) 2.672368022s ago: executing program 4 (id=6375): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0xfff, 0x5, 0x82e, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x40000000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r2}, &(0x7f0000000080), &(0x7f00000001c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000900)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000840)={{r5}, &(0x7f00000004c0), &(0x7f00000003c0)=r6}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x5d) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpid() socketpair$unix(0x1, 0x0, 0x0, 0x0) gettid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) sendmsg$tipc(r1, &(0x7f0000004440)={&(0x7f0000000ec0)=@id, 0x10, 0x0}, 0x0) 2.640825105s ago: executing program 0 (id=6376): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000840)=ANY=[@ANYRESDEC], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x29}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = syz_clone(0x0, 0x0, 0xe, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x0, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r6, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r6, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) close(r5) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0x7, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702004a401bdbd7539e3c000100000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000180)='fib6_table_lookup\x00', r9}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r11}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES8, @ANYRESOCT=r1], 0x0, 0x5bdb7694, 0x0, 0x0, 0x0, 0x40}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 2.640240344s ago: executing program 4 (id=6378): bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@bloom_filter={0x1e, 0x2, 0x2, 0x8, 0x2801, 0xffffffffffffffff, 0x8}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x86, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB], 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r3, @ANYBLOB='\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000700)=[0x0], 0x0, 0x0, 0x19, &(0x7f0000000780)=[{}, {}], 0x10, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0x9, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) socketpair(0x1d, 0x2, 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001080)=ANY=[@ANYBLOB="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", @ANYRESHEX], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfd9b}, 0x48) 2.544356172s ago: executing program 3 (id=6381): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040), &(0x7f0000000240)=[0x0, 0x0, 0x0], 0x0, 0x76, &(0x7f0000000480)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x21, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0}, 0xa2) 2.537475683s ago: executing program 0 (id=6382): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='mm_page_alloc\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='freezer.parent_freezing\x00', 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x3, 0x5}, 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x0, 0x0}, 0x8) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002220207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000040800009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000001b00)={0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000001a40)={0x5, 0x1}, 0x8, 0x10, &(0x7f0000001a80)={0x4, 0x4, 0x4, 0x32}, 0x10, r1, r2, 0x0, 0x0, 0x0, 0x10, 0x5dd51735}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001c00)={&(0x7f0000000000)='f2fs_fiemap\x00'}, 0x1e) r3 = bpf$PROG_LOAD(0x5, &(0x7f00002a0fb8)={0x16, 0x4, &(0x7f0000000f00)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00', 0x0, 0x99, &(0x7f0000000180)=""/148, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xffffffffffffff79}, 0x16) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0x0, 0x83, 0x0, &(0x7f0000000e40)="04d31fcd275bfc58188e699fa7c9aa904991771e83b702f3717cf38ed0e92e83ae490758991fa1174a75fa8c45db732026d3de611ffbd09b683e2f08812d695dd9b87f08711c02bb5d2cbac05022bee8aee5339fb6eba21e534e43b9960f470bf9c075368c6a7ee0b6ef641feb6967490ae07547819adcf47330679551ae2bd7009b31", 0x0, 0x375, 0x0, 0x1b, 0x4b, &(0x7f0000000000), &(0x7f0000000e00)="2fda8e7aa8d9cecae13bcbb35230d1cf1f1b23e33fcbd1aa1bea454b04650cecef80daa9a0a349a8e46d661af6e7ee8cdb5e97e738fe54"}, 0x50) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000000000000000000008500000050"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xaffffffdffffffff, 0xffffffffffffffff, 0x0) socketpair(0x0, 0x0, 0x0, 0x0) write$cgroup_devices(0xffffffffffffffff, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000002500)=ANY=[@ANYBLOB="bf16000000000000b70700000100f0ff4070000000000000500000000000e1ff95000000000000002ba7e1d30cb599e83f040000f300000000bd01212fb56f040026fbfefc41056bd8174b79ed317142fa9ea4158123751c5c652fbc1626cca2a2ad75806150ae0209e62f51ee988e6e06c8206ac6939fc404004900c788b277be1cb79b0a4dcf23d410f6accd3641110bec4e90a634199e07f8f6eb968f200e011ea665c45a34b8580218ce740068720000074e8b1715807ea0ca469e468eea3fd2f73902ebcfcf49822775985bf313405b367e81c700000040000000000200000000005335000000143ea70c2ab40c7cb70cc8943a6d60d7c4900282e147d08e0af4b29df814f5691db43a5c00000004000000000089faff01210cce39bf405f1e846c12423a164a330100846f26ad03dd65873d9f87463ad6f7c2e8ee1a39244960b318778f2a047f6d5bc24fef5d7d6155102b1ced1e8019e63c850af895abba14f6fbd7fb5e2a431ab914040000000000010092c9f4609646b6c5c29647d2f950a959cf9938d6dfcb8ed2cbdc2ba9d580609e31c3fa90812a533ce206e7e57a79d6fce424c2204dd418c005479ecab19bdfb15a32a4fd67ce446adb431d07db79240acaf091231b986e77d05d988d6efdffdf48dca02113a38300cabf2b5543ffc166955709009e000000000061629d1822f720ec23812770d72c700a44e113d17088fdd00600000f7889b8c7044f56ff030000000000006cd4970400cac6f45a6922ded2e29514af463f747c08f4010586903500000000000000000000be34cf0f9d640dd782ac0cbc46903243d0d0f4bc7f253d0500000032daaf281c450e64c33aac8f23e7d1c94c4505a9839688b008c370494f6734b771546d9552d3bb2da0d000000000000000009125c97f0400f5e1671bc5eb7739daa7820a91cb0e732df2ae0000c747e00a4fbfe8942fa859cd28bdaa1509309926c77fbcb15ec58b42b400005a6b649dd5f13cd776e6c7c4b5c4b0de20e033b378553ead4c8cc530b62c36364e6505992209bdbc6203da7a3797246a6adef071102f0aa2c40095ddd05176f5cb8bd99e1ba0f9568f3e3876bba7bf973334e7919a080000000000000004fb996ad919f7e9672ce107000000ad882f2aead166c94500be902ee7dabc768eb9ec13f334aae90981ecaf5f744f22f2e45afe2c9e8632276cffe5f1fc215c0797d0244cf1ce269d10525745caaa3f77d1b80116cb9a38400242010000000100000091a0116f4693133138583da5e10b434697b0443b7b4ddfb3ace29e16e5a881336aad0974269a1025e2a9a135c0508af1aec2926627b43bba1229a7466bdca64f514b7911458da09fe8681916d408d753226a83ae2434ccd3fc508216aea86833030f569d61dc998620fcf4eeb92e7bc511df63c53b82514493b8f3c74f44ba184d40e87612024da1a1ebe316923865f037c01d71b5de81121046d84b18acb5cbea7eecad9b6dd46ed83515cd9f140e5f00019be25b5910a3193e90be231a05fd82e6003969c31082ff1d0eb50a04d14644234828cbb5aaa0ece702abdd425fa25ae04a2315c89064df633700000000d9e5953ea67310993d01000000000000003ac753358791b1490273ca535e05b11d815237743a5b79ad45de2a3c91257f02c2f30f5513662809073710937ed0055b238f466e1442f8ec7a5b394228035039ceeb452dca75f9ff5332b4c4777a3d19c158a0aa9a821667c68549e9da89ad4274ce2d3d7619936768a84a1465fff4eedba55955434f132ab7b884057aeb68f3d675a79907a72ace70902459f6950a06a03507838231a335ae759ed25534f2e90a7def4b3d4af7fd47ab1a701e4b7a7dfc1d12775ed0a31bc7b5855880aa767e68196c7aa5ac115724b6cb8fcebb67719eccd87b06b38566cf61ad2f307a79d2ce9801837bf0bd3af0271de700eef2795d28cb0017000000000000000000e052d93194121b774d21a0317d0346078400004652c769fd3d3e661a2fb511164f1502ab2ac4eb3f19c042163e0bdb88b82de384a8055e8b1e24294b0546cce481ff5618b7b9585dbb64d66debf219fa479abf22f3d64fe82e466ea6f27859946e72f80bb1c9cfcde57b79625e2979fe689a5a246cbbd488f43f46b2536f175f46dfb27d5229467270246ab53616c46edf34c559d3de0c59ca3305e66825715e5e4cd5b54c1b05c09f04337a76a30373baac3ecec91fd546eb7c32dbecb18a308a0004be94dfab28c2a51dc816df0000000000c12254f041804f7f7074356789b1d4dd55f3e045a48241a4ce04d06acb2cf11eab759ba78da5da0f26126d4cf2c73e5f94030000040000000000000000c301985d603403592486204054be3fdda91f9e315886941928e5a8bc1a00e69a98c0a8f7192f6ee93cc4124cf4e7610915efc08c834a44e1d685d6835a40b5bc615949cbcd98d044fa492aa38717481455e86dcd7816ad8940bd1995369d89ae6eadeb9117e8b94ab422c8d62f858875dccdbc89572231ef5d6df6a9c55f8df763c7c64da7cc017e1e3f5cd4cb9fe6d19b11d4d38239d318016e622b9683b7e46be64dc097982e23462392a0cd05afb2e060fd42ef00dfbd057311aab94f307d10c7a1af0d8e5a0fcb547475d13c0000000000000000f1cc97103d714d1abb901f866d9d629b4fb185f45790517c4a0f5c6a5024e3359e8d83e3f6edf9e2afb5ab59c7b2b45cfb0a3c1303a98e4ed531ac11cca1cd744b431de74c7cd6533adaa8ec749061b2959d53da626aa189781dc1be4d5c81aebc0cada819895b377d6cf0a7878ba99864ae84464744c605646caf2e06b13eba7ba10acf77d91b2297e9573abb0a4da534d735a223626402b308daf7835780fa6f4e410000000000fb00000000000000000000b14952139bd4bdbccc5e334c49584655c4fce8c5bb7c54664aef6d780100358aa54b4b49926c4be9ee4659153d9fa95d07cc4efdab2c5f4503148d0255d0b748366dafe042d78479c21d832e1431ed6d646d13e8e7230300920a5642bbed1dee9b46b6f02e572024ccf3c8edd82660e5d74c52be71d780c300000000000000000000000000000000000044ff72f96f084f4b6cdcb1b4a9d8e9f99f1b85497d0c3df704c8a0034c09caeeb0e34799b755649883539258a7b33dcef15d8fd1953ebaaa3cff81a0de7a05a440f20f6b273ceb8678f10378b670be7504dabd1471355d853292775d0366891f0bcf0a6087ed4f1f25ef52394db3e9d8318bbb9baff3db95bfd68a08ded502cc08a485c804e4fd107a7ca2a64ca081c6b2f7b895cdf98b763ebab9451c65eced6f5f97a541210806d885762ac3150225036c7eccd7a05593abd963f9a02df58085115e54f675e6a08d25b5722cabf989b4bbc562e073b81bae61f05c5e1f90e021340b60cc5fb8fdb09b6d20b0d87a6ed800000000000000000000000000000000006cc6f64f583a26a78f7f417f66c0af32f5194ddfce51e5aff28f621bb2fd2a5ab719823488d6e869b08d3d4ac7950c60144cf77437e29895a23282e3c65e015d1c334832a90ee77d93596e3f12e9ca8c67c7f3c9b66c9cb03edec184ad1d9544c7a3be250e471dca00000078544d79c0efe4094e561eeb26ee4c81106d03c004bc1589ef6e13648999c8735e2634e89aaa90c571fa3c07238697b1db783c52715055445e96995fe3273b0346b03fc742c06aa3947e0d9cf0c99b5e245ede85893112deea8bd3355a32ec15e1242f170a51f28cea4105541e96a52da4984d26bd29cb0623f00c6b0a4c00ad406d729babc9d1550a683c349017a340444000000000000000000000920ca49f7cc8194aaebdcae5a62bb7587b57f41f1c2034911f23e6bd0291b3319f03a0a15dea685a8ab75b3c60391afa5483231305402b52a8f9863800f127d6b4518f73a847ca583e855d70c6a4a53f61ad753d5e740db44afd32b019d9e8b41361c2c104fe52837a19dd6952fe2724c0105ab158a54a6a73000000000000000000"], &(0x7f0000000140)='GPL\x00'}, 0x48) 2.423106432s ago: executing program 3 (id=6383): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000040)='blkio.bfq.empty_time\x00', 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x6}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r1}, &(0x7f0000000800), &(0x7f0000000840)=r2}, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0xf, &(0x7f0000000140)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {}, {0x85, 0x0, 0x0, 0x19}}}, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) recvmsg$unix(r3, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000000404000000002e"], 0x0, 0x37}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x9, 0x4, 0x4, 0xa, 0x4, 0xffffffffffffffff, 0x0, '\x00', 0x0, r6, 0x2, 0x1}, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000000000000000000000000fe850000002300000095"], &(0x7f0000001500)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='page_pool_state_release\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x6, 0x4, &(0x7f0000000200)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x18, 0xe, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"/1724], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0xfffffffffffffd00}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000027112190000000000951d0007000000006ab92d8dcb607a25d27f5a4c5baa2ba5d50b5a7f2cd17c04581b69ab8900e98f74"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc, 0xffffffffffffffff, 0x8, 0x0, 0x1a, 0x10, 0x0, 0xce, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xeeed}, 0x18) perf_event_open(&(0x7f00000000c0)={0x3, 0x80, 0x4, 0x1, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000840)='cgroup.threads\x00', 0x2, 0x0) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xf, &(0x7f00000003c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000400008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='mm_page_alloc\x00', r9}, 0x10) r10 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x800086}, 0x10}, 0x90) ioctl$TUNSETOFFLOAD(r10, 0xc004743e, 0x20001410) ioctl$TUNSETOFFLOAD(r10, 0x40047451, 0x2000000c) 2.363775717s ago: executing program 0 (id=6385): socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x108c02}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="1800ed594e39a4206d8b25454e21a053c2e20000200000000000000000000000a16b19afda1f7878845ab60be64ee1f308dccee7fc1526875115b396ca632b4029a801121c8e3c70f3fb07c3ca62e1ec2ae46f7e4b21c7adb25fa5f661f2ae85e14e1190e94728464438cb8e8f42b22f8890f6a44f8749743838bcea862cc73e36d1de8862415b917a090dd5958a4b506248d5568e60354987c5c7c10ebd9352708c6bda7f18820c23a911432de304ef7cf6b5add6732ea87171f0e57412d022acc7ed5d3004fcf7"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x10, &(0x7f0000000040), 0x4) sendmsg$unix(r2, &(0x7f0000000640)={&(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000001280)='\\', 0xffffffe3}], 0x1}, 0x24004044) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000abd92de000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0x24bdb) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="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"/287], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0}, 0xa2) 1.978446468s ago: executing program 4 (id=6386): socketpair$nbd(0x1, 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext, 0x108c02}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="1800ed594e39a4206d8b25454e21a053c2e20000200000000000000000000000a16b19afda1f7878845ab60be64ee1f308dccee7fc1526875115b396ca632b4029a801121c8e3c70f3fb07c3ca62e1ec2ae46f7e4b21c7adb25fa5f661f2ae85e14e1190e94728464438cb8e8f42b22f8890f6a44f8749743838bcea862cc73e36d1de8862415b917a090dd5958a4b506248d5568e60354987c5c7c10ebd9352708c6bda7f18820c23a911432de304ef7cf6b5add6732ea87171f0e57412d022acc7ed5d3004fcf7"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r2, 0x1, 0x10, &(0x7f0000000040), 0x4) sendmsg$unix(r2, &(0x7f0000000640)={&(0x7f00000005c0)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001680)=[{&(0x7f0000001280)='\\', 0xffffffe3}], 0x1}, 0x24004044) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000abd92de000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000010000000000000000000000950000000000000046682d562c31aa909594c57a164463536e83a7f6ac12a8b52f0d70aa97a91fa46cdcefe7534fda04cace652409e818c0b1da96d9c9fa8e9523840100cbac3c07c3db6bc11fa42d9ca632c33ca9a00987000000002cd50db1486b80ee61ff6ddaa4bf0609a8ef7fd07f4c556489cf61cf8e63e826fff67d3299ca9f9b85cdcd75b85bb1775f4ff03b75aa7b6aa1a7e9a2b91d103d541bce370d9e6810dec2fe8300dc5edf3f6aa43810579aedb7e19fbacb5bd5e5337b507559ca6acc6471ecad2746ab01526ace07000000c1ea01c13a2406007d0efb7e91a9dbde2353f035347270d076c93f1b1a810cb2c7d72ee9ce76e6da15600893bc36f6502f00"/287], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r3, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0}, 0xa2) 1.35115173s ago: executing program 2 (id=6392): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="18020000060000000000000000000000850000009e00000095"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r4, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000002c0)='tegra_dma_tx_status\x00', r6}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000380)={&(0x7f0000000080)=ANY=[@ANYBLOB="9feb010018000000000000001c0000001c00000003000000010000000000000e0200000000000000000000000000001004000000002e"], 0x0, 0x37}, 0x20) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340), 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r8}, 0x4) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r9}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000004440)=@base={0x9, 0x4, 0x4, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, r7, 0x2, 0x1}, 0x48) close(r10) sendmsg$tipc(r0, &(0x7f0000004440)={&(0x7f0000000ec0)=@id, 0x10, 0x0}, 0x0) 1.3508877s ago: executing program 2 (id=6393): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x9, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x19, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x90) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040), &(0x7f0000000240)=[0x0, 0x0, 0x0], 0x0, 0x76, &(0x7f0000000480)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x21, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0}, 0xa2) 1.341418871s ago: executing program 2 (id=6394): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000002100)={0xc, 0x4, &(0x7f0000000500)=@raw=[@alu, @ldst={0x0, 0x3, 0x0, 0x9, 0x2}, @map_idx], 0x0, 0xb4, 0x0, 0x0, 0x0, 0x14, '\x00', 0x0, 0x2f, r1, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, r0, 0x0, 0x0, &(0x7f00000020c0)}, 0x90) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x10, &(0x7f0000000000), 0x4) recvmsg$unix(0xffffffffffffffff, &(0x7f0000002500)={0x0, 0x2a, 0x0, 0x0, 0xfffffffffffffffd, 0x13}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, 0x0}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b7030000fcffffff850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r2, 0x0, 0x0, 0x3100, 0x0, 0x0, 0x500d, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00'}, 0x10) 1.276677316s ago: executing program 2 (id=6395): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000840)=ANY=[@ANYRESDEC], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x29}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = syz_clone(0x0, 0x0, 0xe, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@base={0x0, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffffffe}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6tnl0\x00', 0x210}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r6, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r6, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) close(r5) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0x7, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702004a401bdbd7539e3c000100000085"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000180)='fib6_table_lookup\x00', r9}, 0x10) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r11}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES8, @ANYRESOCT=r1], 0x0, 0x5bdb7694, 0x0, 0x0, 0x0, 0x40}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.082302002s ago: executing program 3 (id=6396): bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@bloom_filter={0x1e, 0x2, 0x2, 0x8, 0x2801, 0xffffffffffffffff, 0x8}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x86, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB], 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r3, @ANYBLOB='\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000700)=[0x0], 0x0, 0x0, 0x19, &(0x7f0000000780)=[{}, {}], 0x10, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0x9, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) socketpair(0x1d, 0x2, 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001080)=ANY=[@ANYBLOB="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", @ANYRESHEX], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfd9b}, 0x48) 1.075567322s ago: executing program 2 (id=6397): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) write$cgroup_freezer_state(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_GET_NEXT_ID(0x17, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r0, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000000)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040), &(0x7f0000000240)=[0x0, 0x0, 0x0], 0x0, 0x76, &(0x7f0000000480)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000004c0), &(0x7f0000000500), 0x8, 0x21, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000003c0)=@bpf_lsm={0x1e, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="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"/287], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x80) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={r1, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, 0x48, 0x0, &(0x7f0000000000)='\x00', 0x0}, 0xa2) 574.337923ms ago: executing program 3 (id=6398): bpf$MAP_CREATE(0x0, &(0x7f0000001a80)=@bloom_filter={0x1e, 0x2, 0x2, 0x8, 0x2801, 0xffffffffffffffff, 0x8}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r0}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x86, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB], 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r3, @ANYBLOB='\x00'], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000880)={r2, 0xe0, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, &(0x7f0000000700)=[0x0], 0x0, 0x0, 0x19, &(0x7f0000000780)=[{}, {}], 0x10, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0x9, 0x8, 0x8, &(0x7f0000000840)}}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) socketpair(0x1d, 0x2, 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001080)=ANY=[@ANYBLOB="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", @ANYRESHEX], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfd9b}, 0x48) 234.961541ms ago: executing program 2 (id=6399): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x1e, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000230000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7040000000000008500000057"], 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0x3, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000009500000000000000da33137ec92ce5a1fb663b657a6bdc3832907283ee4671fd2316663813f0e6607c141bf2f1632a5f1a9ca7fa4f3a5f64ba832d7bbab5f042206a6e100b16b9161d2904916f101f11d9e5b0df9b8f52089af35207230241ba4af35f53"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x64}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={0x0, r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{}, 0x0, &(0x7f0000000040)}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000080)={r1, 0x58, &(0x7f00000003c0)}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10000}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0x0, 0x0, 0x0, 0x4}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x1c1341, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00'}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_freezer_state(r6, &(0x7f0000000140), 0x2, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) 36.173467ms ago: executing program 3 (id=6400): socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xf, 0x4, 0xfff, 0x5, 0x82e, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x40000000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000240)={{r2}, &(0x7f0000000080), &(0x7f00000001c0)}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000900)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000840)={{r5}, &(0x7f00000004c0), &(0x7f00000003c0)=r6}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x5d) socketpair$unix(0x1, 0x0, 0x0, 0x0) getpid() socketpair$unix(0x1, 0x0, 0x0, 0x0) gettid() sendmsg$tipc(r1, &(0x7f0000004440)={&(0x7f0000000ec0)=@id, 0x10, 0x0}, 0x0) 0s ago: executing program 3 (id=6401): perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x40, 0x0, 0x4000000000, 0x20024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x4, @perf_config_ext={0x0, 0x9f89}, 0x8519}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=@bloom_filter={0x1e, 0xe4d, 0xebd2, 0x89ef, 0x420, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x3, 0xb}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000f00)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xffffffffffffff79) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa2000000000600000000000000ffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xd, 0x6, &(0x7f0000000880)=ANY=[@ANYBLOB="05000000000000007111b300000000008510000002000000850000000000000095000000000000009500a5050000000090678ff70d3c972212d8b715cb3f961d2242b5f9bd19aae7d4783f945285507918d9281c4e0d0dd27ae12d31aae966602503cf3cbb7ab5663441fbd0a7633c0f75011bb510f01ad76e637f5eed4c5615aa102bbd93cd8ccd54834552972de8f16d1207471ef507566c6583d2db505422af772815c23fa9707dad26d2f468db131aa2b975e1b03cf235ac88ccdded381bc91298ef7e7fa03c999cd75ec2b0606bc0f167486a2334baa8a8f449db2e0c20a42a7883eb3babae"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x6}, 0x70) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0xfffffffd, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000340)=@base={0x12, 0x2, 0x8, 0x2}, 0x48) close(r2) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r3}, &(0x7f00000006c0), &(0x7f0000000700)=r2}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001540)={{r3, 0xffffffffffffffff}, &(0x7f00000014c0), &(0x7f0000001500)=r2}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000d40)={0x1, 0x1a, &(0x7f0000000e80)=ANY=[@ANYBLOB="180000000500000000000000f106000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf090000000000005509010000000000950000000000000018160000", @ANYRES32=r0, @ANYBLOB="0000000000000000180100002020642500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300009224000085000000dd060000000ac32b3a6e064ac5e15e34000802000000bf91000000000000b7020000020500008500000085000000b7000000000000009500000000000000eea82d17ab6c00bc134a57c84afbe01f"], &(0x7f0000000180)='syzkaller\x00', 0x10, 0xe0, &(0x7f0000000b40)=""/224, 0x41000, 0x1, '\x00', 0x0, 0x27, 0xffffffffffffffff, 0x8, &(0x7f0000000800)={0x5, 0x3}, 0x8, 0x10, &(0x7f0000000980)={0x5, 0x1, 0xc, 0x4}, 0x10, 0x0, r1, 0x3, &(0x7f0000000c40)=[r3, r4, r3], &(0x7f0000000c80)=[{0x0, 0x3, 0xf, 0x5}, {0x4, 0x2, 0xa, 0x8}, {0x3, 0x1, 0xa, 0x5}], 0x10, 0x8}, 0x90) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r7, 0x8914, &(0x7f0000000080)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x12, 0x2, 0x4, 0x2}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r9}, &(0x7f0000000040), &(0x7f0000000140)=r8}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r10}, 0x10) write$cgroup_subtree(r6, &(0x7f0000000380)=ANY=[], 0xfdef) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000680)={r5, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000540)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000340)=[0x0], 0x0, 0xd3, &(0x7f0000000e00)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000000400), &(0x7f0000000500), 0x8, 0xee, 0x8, 0x8, &(0x7f0000000e40)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xb, &(0x7f0000000cc0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b70300000000002085000000326bed"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r11 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000840)={{r11}, &(0x7f0000000000), &(0x7f00000005c0)}, 0x20) kernel console output (not intermixed with test programs): obe_write_user helper that may corrupt user memory! [ 106.692484][ T4180] device veth0_vlan left promiscuous mode [ 106.777141][ T4180] device veth0_vlan entered promiscuous mode [ 106.866229][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 106.877571][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): ªªªªªª: link becomes ready [ 106.890085][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 108.118426][ T4240] device syzkaller0 entered promiscuous mode [ 108.176415][ T4238] : renamed from ipvlan1 [ 109.316499][ T4281] device syzkaller0 entered promiscuous mode [ 110.126899][ T4307] syz.2.1453[4307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 110.126975][ T4307] syz.2.1453[4307] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 111.006412][ T4327] device syzkaller0 entered promiscuous mode [ 112.188600][ T4367] syz.1.1474[4367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.188680][ T4367] syz.1.1474[4367] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 112.279169][ T4365] device syzkaller0 entered promiscuous mode [ 113.131457][ T4389] device syzkaller0 entered promiscuous mode [ 114.899298][ T4438] syz.1.1499[4438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 114.899376][ T4438] syz.1.1499[4438] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 119.694451][ T4573] FAULT_INJECTION: forcing a failure. [ 119.694451][ T4573] name failslab, interval 1, probability 0, space 0, times 0 [ 119.725224][ T4578] device pim6reg1 entered promiscuous mode [ 119.748325][ T4573] CPU: 1 PID: 4573 Comm: syz.3.1542 Not tainted 5.15.151-syzkaller-00127-g4edafe6c0231 #0 [ 119.758136][ T4573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 119.768029][ T4573] Call Trace: [ 119.771158][ T4573] [ 119.773956][ T4573] dump_stack_lvl+0x151/0x1b7 [ 119.778445][ T4573] ? io_uring_drop_tctx_refs+0x190/0x190 [ 119.783910][ T4573] ? avc_has_perm_noaudit+0x2dd/0x430 [ 119.789224][ T4573] dump_stack+0x15/0x17 [ 119.793204][ T4573] should_fail+0x3c6/0x510 [ 119.797453][ T4573] __should_failslab+0xa4/0xe0 [ 119.802063][ T4573] ? perf_event_alloc+0x122/0x1b00 [ 119.806997][ T4573] should_failslab+0x9/0x20 [ 119.811336][ T4573] slab_pre_alloc_hook+0x37/0xd0 [ 119.816117][ T4573] ? perf_event_alloc+0x122/0x1b00 [ 119.821059][ T4573] kmem_cache_alloc+0x44/0x200 [ 119.825665][ T4573] perf_event_alloc+0x122/0x1b00 [ 119.830431][ T4573] ? _raw_spin_unlock+0x4d/0x70 [ 119.835128][ T4573] ? alloc_fd+0x4c6/0x590 [ 119.839286][ T4573] __se_sys_perf_event_open+0x7b4/0x3ce0 [ 119.844762][ T4573] ? file_end_write+0x1c0/0x1c0 [ 119.849539][ T4573] ? wait_for_completion_killable_timeout+0x10/0x10 [ 119.855948][ T4573] ? __mutex_lock_slowpath+0x10/0x10 [ 119.861071][ T4573] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 119.866536][ T4573] ? __kasan_check_write+0x14/0x20 [ 119.871488][ T4573] ? fput_many+0x160/0x1b0 [ 119.875743][ T4573] ? debug_smp_processor_id+0x17/0x20 [ 119.881034][ T4573] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 119.886936][ T4573] __x64_sys_perf_event_open+0xbf/0xd0 [ 119.892318][ T4573] do_syscall_64+0x3d/0xb0 [ 119.896568][ T4573] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 119.902296][ T4573] RIP: 0033:0x7ff388d3e299 [ 119.906559][ T4573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 119.925992][ T4573] RSP: 002b:00007ff3879be048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 119.934235][ T4573] RAX: ffffffffffffffda RBX: 00007ff388eccf80 RCX: 00007ff388d3e299 [ 119.942047][ T4573] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000020000000 [ 119.949865][ T4573] RBP: 00007ff3879be0a0 R08: 0000000000000000 R09: 0000000000000000 [ 119.957809][ T4573] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 119.965648][ T4573] R13: 000000000000000b R14: 00007ff388eccf80 R15: 00007ffda339e8f8 [ 119.973437][ T4573] [ 124.419366][ T4710] bond_slave_1: mtu less than device minimum [ 125.247108][ T4740] FAULT_INJECTION: forcing a failure. [ 125.247108][ T4740] name failslab, interval 1, probability 0, space 0, times 0 [ 125.297073][ T4740] CPU: 0 PID: 4740 Comm: syz.3.1603 Not tainted 5.15.151-syzkaller-00127-g4edafe6c0231 #0 [ 125.306905][ T4740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 125.316802][ T4740] Call Trace: [ 125.320009][ T4740] [ 125.322788][ T4740] dump_stack_lvl+0x151/0x1b7 [ 125.327299][ T4740] ? io_uring_drop_tctx_refs+0x190/0x190 [ 125.332766][ T4740] ? kmem_cache_free+0x116/0x2e0 [ 125.337540][ T4740] ? kasan_set_track+0x5d/0x70 [ 125.342138][ T4740] ? kasan_set_free_info+0x23/0x40 [ 125.347088][ T4740] ? ____kasan_slab_free+0x126/0x160 [ 125.352209][ T4740] ? __kasan_slab_free+0x11/0x20 [ 125.356984][ T4740] ? kmem_cache_free+0x116/0x2e0 [ 125.361754][ T4740] ? putname+0xfa/0x150 [ 125.365749][ T4740] dump_stack+0x15/0x17 [ 125.369748][ T4740] should_fail+0x3c6/0x510 [ 125.374000][ T4740] __should_failslab+0xa4/0xe0 [ 125.378593][ T4740] should_failslab+0x9/0x20 [ 125.382931][ T4740] slab_pre_alloc_hook+0x37/0xd0 [ 125.387717][ T4740] __kmalloc+0x6d/0x270 [ 125.391839][ T4740] ? bpf_test_init+0x101/0x1b0 [ 125.396435][ T4740] bpf_test_init+0x101/0x1b0 [ 125.400867][ T4740] bpf_prog_test_run_skb+0x268/0x1420 [ 125.406062][ T4740] ? __kasan_check_write+0x14/0x20 [ 125.411020][ T4740] ? proc_fail_nth_write+0x20b/0x290 [ 125.416133][ T4740] ? selinux_file_permission+0x2c4/0x570 [ 125.421610][ T4740] ? proc_fail_nth_read+0x210/0x210 [ 125.426640][ T4740] ? fsnotify_perm+0x6a/0x5d0 [ 125.431152][ T4740] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 125.437308][ T4740] ? __kasan_check_write+0x14/0x20 [ 125.442255][ T4740] ? fput_many+0x160/0x1b0 [ 125.446509][ T4740] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 125.452238][ T4740] bpf_prog_test_run+0x3b0/0x630 [ 125.457015][ T4740] ? bpf_prog_query+0x220/0x220 [ 125.461698][ T4740] ? selinux_bpf+0xd2/0x100 [ 125.466038][ T4740] ? security_bpf+0x82/0xb0 [ 125.470379][ T4740] __sys_bpf+0x525/0x760 [ 125.474458][ T4740] ? fput_many+0x160/0x1b0 [ 125.478715][ T4740] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 125.483922][ T4740] ? debug_smp_processor_id+0x17/0x20 [ 125.489134][ T4740] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 125.495027][ T4740] __x64_sys_bpf+0x7c/0x90 [ 125.499281][ T4740] do_syscall_64+0x3d/0xb0 [ 125.503534][ T4740] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 125.509267][ T4740] RIP: 0033:0x7ff388d3e299 [ 125.513519][ T4740] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 125.533040][ T4740] RSP: 002b:00007ff3879be048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 125.541291][ T4740] RAX: ffffffffffffffda RBX: 00007ff388eccf80 RCX: 00007ff388d3e299 [ 125.549100][ T4740] RDX: 000000000000002c RSI: 0000000020000080 RDI: 000000000000000a [ 125.557037][ T4740] RBP: 00007ff3879be0a0 R08: 0000000000000000 R09: 0000000000000000 [ 125.564847][ T4740] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 125.572670][ T4740] R13: 000000000000000b R14: 00007ff388eccf80 R15: 00007ffda339e8f8 [ 125.580483][ T4740] [ 125.841594][ T4750] bond_slave_1: mtu less than device minimum [ 126.828888][ T4775] bond_slave_1: mtu less than device minimum [ 126.985390][ T4782] bond_slave_1: mtu less than device minimum [ 127.432933][ T4796] FAULT_INJECTION: forcing a failure. [ 127.432933][ T4796] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 127.480067][ T4796] CPU: 0 PID: 4796 Comm: syz.4.1625 Not tainted 5.15.151-syzkaller-00127-g4edafe6c0231 #0 [ 127.489903][ T4796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 127.499795][ T4796] Call Trace: [ 127.502919][ T4796] [ 127.505696][ T4796] dump_stack_lvl+0x151/0x1b7 [ 127.510218][ T4796] ? io_uring_drop_tctx_refs+0x190/0x190 [ 127.515763][ T4796] ? kasan_set_track+0x5d/0x70 [ 127.520379][ T4796] ? __kasan_slab_free+0x11/0x20 [ 127.525143][ T4796] ? kmem_cache_free+0x116/0x2e0 [ 127.530029][ T4796] ? putname+0xfa/0x150 [ 127.534007][ T4796] ? do_sys_openat2+0x71c/0x830 [ 127.538694][ T4796] ? do_syscall_64+0x3d/0xb0 [ 127.543119][ T4796] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 127.549023][ T4796] dump_stack+0x15/0x17 [ 127.553025][ T4796] should_fail+0x3c6/0x510 [ 127.557275][ T4796] should_fail_usercopy+0x1a/0x20 [ 127.562214][ T4796] _copy_from_user+0x20/0xd0 [ 127.566639][ T4796] iovec_from_user+0xc7/0x330 [ 127.571152][ T4796] __import_iovec+0x6d/0x420 [ 127.575583][ T4796] import_iovec+0xe5/0x120 [ 127.579832][ T4796] ___sys_recvmsg+0x56b/0x690 [ 127.584347][ T4796] ? __sys_recvmsg+0x260/0x260 [ 127.588946][ T4796] ? vfs_write+0x9ec/0x1110 [ 127.593297][ T4796] ? __fdget+0x1bc/0x240 [ 127.597363][ T4796] __x64_sys_recvmsg+0x1dc/0x2b0 [ 127.602139][ T4796] ? fput+0x1a/0x20 [ 127.605785][ T4796] ? ___sys_recvmsg+0x690/0x690 [ 127.610473][ T4796] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 127.616380][ T4796] ? exit_to_user_mode_prepare+0x39/0xa0 [ 127.621932][ T4796] do_syscall_64+0x3d/0xb0 [ 127.626180][ T4796] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 127.631912][ T4796] RIP: 0033:0x7f35c1110299 [ 127.636163][ T4796] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 127.655606][ T4796] RSP: 002b:00007f35bfd90048 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 127.663848][ T4796] RAX: ffffffffffffffda RBX: 00007f35c129ef80 RCX: 00007f35c1110299 [ 127.671664][ T4796] RDX: 0000000000000000 RSI: 00000000200004c0 RDI: 0000000000000004 [ 127.679470][ T4796] RBP: 00007f35bfd900a0 R08: 0000000000000000 R09: 0000000000000000 [ 127.687283][ T4796] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 127.695145][ T4796] R13: 000000000000000b R14: 00007f35c129ef80 R15: 00007fffff4cb5b8 [ 127.702910][ T4796] [ 127.979767][ T4811] syz.2.1632[4811] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.979844][ T4811] syz.2.1632[4811] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 128.243152][ T4816] bond_slave_1: mtu less than device minimum [ 128.517476][ T30] audit: type=1400 audit(1722038434.600:145): avc: denied { create } for pid=4829 comm="syz.3.1639" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 129.114390][ T4849] bridge0: port 4(veth0_vlan) entered blocking state [ 129.153009][ T4849] bridge0: port 4(veth0_vlan) entered disabled state [ 211.515843][ T6853] bridge0: port 1(bridge_slave_0) entered blocking state [ 211.591946][ T6853] bridge0: port 1(bridge_slave_0) entered disabled state [ 211.693446][ T6853] device bridge_slave_0 entered promiscuous mode [ 211.877679][ T6853] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.007025][ T6853] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.126187][ T6853] device bridge_slave_1 entered promiscuous mode [ 212.550207][ T10] device bridge_slave_1 left promiscuous mode [ 212.556266][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.600751][ T10] device bridge_slave_0 left promiscuous mode [ 212.632305][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 213.572703][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.580633][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.650013][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.676185][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.750620][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.757510][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.813697][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.829502][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.853922][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.861426][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.945808][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.953753][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 214.003759][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 214.031812][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 214.057366][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 214.099158][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 214.215456][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 214.283192][ T6853] device veth0_vlan entered promiscuous mode [ 214.358997][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 214.383566][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 214.482964][ T6853] device veth1_macvtap entered promiscuous mode [ 214.530935][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 214.562549][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 214.602835][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 214.615614][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 214.636219][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 214.664469][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 214.672972][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 214.681267][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 214.689364][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 226.107257][ T7167] bridge0: port 1(bridge_slave_0) entered blocking state [ 226.114110][ T7167] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.204802][ T7167] device bridge_slave_0 entered promiscuous mode [ 226.221738][ T7167] bridge0: port 2(bridge_slave_1) entered blocking state [ 226.232480][ T7167] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.239929][ T7167] device bridge_slave_1 entered promiscuous mode [ 226.679431][ T327] device bridge_slave_1 left promiscuous mode [ 226.685815][ T327] bridge0: port 2(bridge_slave_1) entered disabled state [ 226.807670][ T327] device bridge_slave_0 left promiscuous mode [ 226.813663][ T327] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.853545][ T327] device veth0_vlan left promiscuous mode [ 227.618985][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 227.636726][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 227.784397][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 227.809567][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 227.864523][ T2675] bridge0: port 1(bridge_slave_0) entered blocking state [ 227.871421][ T2675] bridge0: port 1(bridge_slave_0) entered forwarding state [ 227.929342][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 227.948523][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 227.966709][ T2675] bridge0: port 2(bridge_slave_1) entered blocking state [ 227.973585][ T2675] bridge0: port 2(bridge_slave_1) entered forwarding state [ 228.049396][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 228.100690][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 228.165303][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 228.187308][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 228.209577][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 228.219070][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 228.237897][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 228.246280][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 228.255223][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 228.331220][ T7167] device veth0_vlan entered promiscuous mode [ 228.341241][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 228.358288][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 228.463775][ T7167] device veth1_macvtap entered promiscuous mode [ 228.558348][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 228.566414][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 228.617404][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 228.721033][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 228.740655][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 228.772976][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 228.797320][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 256.936637][ T7963] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.000843][ T7963] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.020963][ T7963] device bridge_slave_0 entered promiscuous mode [ 257.080638][ T7963] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.091276][ T7963] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.098691][ T7963] device bridge_slave_1 entered promiscuous mode [ 257.548175][ T7963] bridge0: port 2(bridge_slave_1) entered blocking state [ 257.555052][ T7963] bridge0: port 2(bridge_slave_1) entered forwarding state [ 257.562264][ T7963] bridge0: port 1(bridge_slave_0) entered blocking state [ 257.569022][ T7963] bridge0: port 1(bridge_slave_0) entered forwarding state [ 257.738265][ T2673] bridge0: port 1(bridge_slave_0) entered disabled state [ 257.760090][ T2673] bridge0: port 2(bridge_slave_1) entered disabled state [ 257.994698][ T327] device bridge_slave_1 left promiscuous mode [ 258.001986][ T327] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.026382][ T327] device bridge_slave_0 left promiscuous mode [ 258.037225][ T327] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.061794][ T327] device veth0_vlan left promiscuous mode [ 258.943483][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 258.976687][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 259.068482][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 259.076642][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 259.225025][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 259.232024][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 259.344317][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 259.407586][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 259.459008][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 259.465880][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 259.488769][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 259.501323][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 259.525228][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 259.535322][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 259.545948][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 259.578662][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 259.611661][ T7963] device veth0_vlan entered promiscuous mode [ 259.653217][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 259.664954][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 259.709705][ T7963] device veth1_macvtap entered promiscuous mode [ 259.758631][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 259.822944][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 259.914955][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 260.001279][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 260.081288][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 260.254405][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 260.282956][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 260.389352][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 260.505877][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 293.451941][ T8808] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.509664][ T8808] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.580123][ T8808] device bridge_slave_0 entered promiscuous mode [ 293.651754][ T8808] bridge0: port 2(bridge_slave_1) entered blocking state [ 293.704306][ T8808] bridge0: port 2(bridge_slave_1) entered disabled state [ 293.744891][ T8808] device bridge_slave_1 entered promiscuous mode [ 294.228591][ T327] device bridge_slave_1 left promiscuous mode [ 294.239134][ T327] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.304602][ T327] device bridge_slave_0 left promiscuous mode [ 294.353849][ T327] bridge0: port 1(bridge_slave_0) entered disabled state [ 294.989235][ T2677] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 294.996830][ T2677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 295.021893][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 295.032302][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 295.042467][ T2675] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.049335][ T2675] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.056757][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 295.064962][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 295.073257][ T2675] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.080297][ T2675] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.117040][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 295.137550][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 295.187444][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 295.248126][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 295.311576][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 295.379692][ T8808] device veth0_vlan entered promiscuous mode [ 295.461228][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 295.487584][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 295.554464][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 295.604896][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 295.647752][ T8808] device veth1_macvtap entered promiscuous mode [ 295.680096][ T2677] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 295.687796][ T2677] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 295.695097][ T2677] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 295.783484][ T2677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 295.832093][ T2677] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 295.924574][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 295.954858][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 296.017486][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 296.086624][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 306.991162][ T9114] bridge0: port 1(bridge_slave_0) entered blocking state [ 307.087213][ T9114] bridge0: port 1(bridge_slave_0) entered disabled state [ 307.190781][ T9114] device bridge_slave_0 entered promiscuous mode [ 307.282187][ T9114] bridge0: port 2(bridge_slave_1) entered blocking state [ 307.383980][ T9114] bridge0: port 2(bridge_slave_1) entered disabled state [ 307.405859][ T9114] device bridge_slave_1 entered promiscuous mode [ 307.944472][ T8] device bridge_slave_1 left promiscuous mode [ 307.956052][ T8] bridge0: port 2(bridge_slave_1) entered disabled state [ 308.044272][ T8] device bridge_slave_0 left promiscuous mode [ 308.089070][ T8] bridge0: port 1(bridge_slave_0) entered disabled state [ 308.174493][ T8] device veth1_macvtap left promiscuous mode [ 308.229393][ T8] device veth0_vlan left promiscuous mode [ 309.323904][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 309.338104][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 309.421102][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 309.444940][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 309.537263][ T2673] bridge0: port 1(bridge_slave_0) entered blocking state [ 309.544329][ T2673] bridge0: port 1(bridge_slave_0) entered forwarding state [ 309.557645][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 309.566056][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 309.574640][ T2673] bridge0: port 2(bridge_slave_1) entered blocking state [ 309.581548][ T2673] bridge0: port 2(bridge_slave_1) entered forwarding state [ 309.678018][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 309.745689][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 309.868951][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 309.922730][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 309.975386][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 310.076451][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 310.135154][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 310.196612][ T9114] device veth0_vlan entered promiscuous mode [ 310.232660][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 310.248519][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 310.301570][ T9114] device veth1_macvtap entered promiscuous mode [ 310.355790][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 310.371388][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 310.392318][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 310.495762][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 310.558752][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 310.674719][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 310.704911][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 310.790599][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 310.875078][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 334.471843][ T9800] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.564867][ T9800] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.687043][ T9800] device bridge_slave_0 entered promiscuous mode [ 334.829993][ T9800] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.988520][ T9800] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.107718][ T9800] device bridge_slave_1 entered promiscuous mode [ 335.178150][ T10] device bridge_slave_1 left promiscuous mode [ 335.184136][ T10] bridge0: port 2(bridge_slave_1) entered disabled state [ 335.230621][ T10] device bridge_slave_0 left promiscuous mode [ 335.283999][ T10] bridge0: port 1(bridge_slave_0) entered disabled state [ 335.320906][ T10] device veth1_macvtap left promiscuous mode [ 335.347058][ T10] device veth0_vlan left promiscuous mode [ 336.401311][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 336.426769][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 336.653275][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 336.683516][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 336.804152][ T2673] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.811134][ T2673] bridge0: port 1(bridge_slave_0) entered forwarding state [ 336.837146][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 336.947520][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 337.027748][ T2673] bridge0: port 2(bridge_slave_1) entered blocking state [ 337.034633][ T2673] bridge0: port 2(bridge_slave_1) entered forwarding state [ 337.082703][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 337.096804][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 337.114606][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 337.171423][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 337.243369][ T9800] device veth0_vlan entered promiscuous mode [ 337.318544][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 337.338217][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 337.362799][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 337.376247][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 337.394265][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 337.421589][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 337.430000][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 337.506433][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 337.546165][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 337.574567][ T9800] device veth1_macvtap entered promiscuous mode [ 337.605180][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 337.623164][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 337.640287][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 337.693353][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 337.711205][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 376.132951][T10689] bridge0: port 1(bridge_slave_0) entered blocking state [ 376.144530][T10689] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.152306][T10689] device bridge_slave_0 entered promiscuous mode [ 376.159493][T10689] bridge0: port 2(bridge_slave_1) entered blocking state [ 376.166376][T10689] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.174059][T10689] device bridge_slave_1 entered promiscuous mode [ 376.443049][ T327] device bridge_slave_1 left promiscuous mode [ 376.449290][ T327] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.530878][ T327] device bridge_slave_0 left promiscuous mode [ 376.561851][ T327] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.579794][ T327] device veth1_macvtap left promiscuous mode [ 376.592272][ T327] device veth0_vlan left promiscuous mode [ 377.887566][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 377.909561][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 378.021716][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 378.044794][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 378.105506][ T2674] bridge0: port 1(bridge_slave_0) entered blocking state [ 378.112410][ T2674] bridge0: port 1(bridge_slave_0) entered forwarding state [ 378.221155][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 378.327462][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 378.376133][ T2674] bridge0: port 2(bridge_slave_1) entered blocking state [ 378.383032][ T2674] bridge0: port 2(bridge_slave_1) entered forwarding state [ 378.502563][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 378.594276][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 378.649403][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 378.721820][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 378.815458][T10689] device veth0_vlan entered promiscuous mode [ 378.884941][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 378.913481][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 378.968937][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 378.983224][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 378.994773][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 379.002898][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 379.033178][T10689] device veth1_macvtap entered promiscuous mode [ 379.125252][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 379.133733][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 379.178159][ T2805] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 379.303978][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 379.360916][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 379.400477][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 379.408859][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 391.769157][T11080] FAULT_INJECTION: forcing a failure. [ 391.769157][T11080] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 391.787055][T11080] CPU: 0 PID: 11080 Comm: syz.3.4244 Not tainted 5.15.151-syzkaller-00127-g4edafe6c0231 #0 [ 391.796862][T11080] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 391.806757][T11080] Call Trace: [ 391.809880][T11080] [ 391.812658][T11080] dump_stack_lvl+0x151/0x1b7 [ 391.817175][T11080] ? io_uring_drop_tctx_refs+0x190/0x190 [ 391.822725][T11080] ? __hrtimer_run_queues+0xa6f/0xad0 [ 391.827937][T11080] dump_stack+0x15/0x17 [ 391.831971][T11080] should_fail+0x3c6/0x510 [ 391.836181][T11080] should_fail_usercopy+0x1a/0x20 [ 391.841040][T11080] _copy_from_user+0x20/0xd0 [ 391.845469][T11080] __sys_bpf+0x1e9/0x760 [ 391.849545][T11080] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 391.854759][T11080] ? debug_smp_processor_id+0x17/0x20 [ 391.859959][T11080] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 391.865863][T11080] __x64_sys_bpf+0x7c/0x90 [ 391.870118][T11080] do_syscall_64+0x3d/0xb0 [ 391.874369][T11080] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 391.880014][T11080] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 391.885756][T11080] RIP: 0033:0x7f43aff9a299 [ 391.889997][T11080] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 391.909435][T11080] RSP: 002b:00007f43aebf9048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 391.917766][T11080] RAX: ffffffffffffffda RBX: 00007f43b0129058 RCX: 00007f43aff9a299 [ 391.925664][T11080] RDX: 0000000000000048 RSI: 00000000200017c0 RDI: 0000000000000005 [ 391.933477][T11080] RBP: 00007f43aebf90a0 R08: 0000000000000000 R09: 0000000000000000 [ 391.941504][T11080] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 391.949297][T11080] R13: 000000000000006e R14: 00007f43b0129058 R15: 00007ffea0106368 [ 391.957209][T11080] [ 392.374903][T11095] FAULT_INJECTION: forcing a failure. [ 392.374903][T11095] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 392.457170][T11095] CPU: 0 PID: 11095 Comm: syz.3.4251 Not tainted 5.15.151-syzkaller-00127-g4edafe6c0231 #0 [ 392.466987][T11095] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 392.476879][T11095] Call Trace: [ 392.480015][T11095] [ 392.482778][T11095] dump_stack_lvl+0x151/0x1b7 [ 392.487297][T11095] ? io_uring_drop_tctx_refs+0x190/0x190 [ 392.492779][T11095] ? __hrtimer_run_queues+0xa6f/0xad0 [ 392.497970][T11095] dump_stack+0x15/0x17 [ 392.501960][T11095] should_fail+0x3c6/0x510 [ 392.506216][T11095] should_fail_usercopy+0x1a/0x20 [ 392.511075][T11095] _copy_from_user+0x20/0xd0 [ 392.515502][T11095] __sys_bpf+0x1e9/0x760 [ 392.519584][T11095] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 392.524793][T11095] ? debug_smp_processor_id+0x17/0x20 [ 392.529996][T11095] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 392.535898][T11095] __x64_sys_bpf+0x7c/0x90 [ 392.540153][T11095] do_syscall_64+0x3d/0xb0 [ 392.544403][T11095] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 392.550051][T11095] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 392.555783][T11095] RIP: 0033:0x7f43aff9a299 [ 392.560115][T11095] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 392.579556][T11095] RSP: 002b:00007f43aec1a048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 392.587801][T11095] RAX: ffffffffffffffda RBX: 00007f43b0128f80 RCX: 00007f43aff9a299 [ 392.595714][T11095] RDX: 0000000000000048 RSI: 00000000200017c0 RDI: 0000000000000005 [ 392.603595][T11095] RBP: 00007f43aec1a0a0 R08: 0000000000000000 R09: 0000000000000000 [ 392.611412][T11095] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 392.619215][T11095] R13: 000000000000000b R14: 00007f43b0128f80 R15: 00007ffea0106368 [ 392.627036][T11095] [ 399.757100][T11312] tap0: tun_chr_ioctl cmd 1074025676 [ 399.790987][T11312] tap0: owner set to 0 [ 401.602105][T11359] tap0: tun_chr_ioctl cmd 1074025676 [ 401.620953][T11359] tap0: owner set to 0 [ 402.247219][T11394] device xfrm0 entered promiscuous mode [ 402.310903][T11403] tap0: tun_chr_ioctl cmd 1074025676 [ 402.316103][T11403] tap0: owner set to 0 [ 404.108455][T11469] tap0: tun_chr_ioctl cmd 1074025676 [ 404.117776][T11469] tap0: owner set to 0 [ 404.761611][T11486] device syzkaller0 entered promiscuous mode [ 410.057984][T11639] FAULT_INJECTION: forcing a failure. [ 410.057984][T11639] name failslab, interval 1, probability 0, space 0, times 0 [ 410.070702][T11639] CPU: 1 PID: 11639 Comm: syz.4.4462 Not tainted 5.15.151-syzkaller-00127-g4edafe6c0231 #0 [ 410.080501][T11639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 410.090394][T11639] Call Trace: [ 410.093520][T11639] [ 410.096304][T11639] dump_stack_lvl+0x151/0x1b7 [ 410.100810][T11639] ? io_uring_drop_tctx_refs+0x190/0x190 [ 410.106278][T11639] ? task_work_run+0x129/0x190 [ 410.110963][T11639] ? exit_to_user_mode_prepare+0x5a/0xa0 [ 410.116567][T11639] ? syscall_exit_to_user_mode+0x26/0x160 [ 410.122117][T11639] ? do_syscall_64+0x49/0xb0 [ 410.126548][T11639] dump_stack+0x15/0x17 [ 410.130537][T11639] should_fail+0x3c6/0x510 [ 410.134807][T11639] __should_failslab+0xa4/0xe0 [ 410.139391][T11639] ? __alloc_skb+0xbe/0x550 [ 410.143731][T11639] should_failslab+0x9/0x20 [ 410.148067][T11639] slab_pre_alloc_hook+0x37/0xd0 [ 410.152840][T11639] ? __alloc_skb+0xbe/0x550 [ 410.157276][T11639] kmem_cache_alloc+0x44/0x200 [ 410.161880][T11639] __alloc_skb+0xbe/0x550 [ 410.166047][T11639] tipc_msg_create+0x4c/0x530 [ 410.170607][T11639] tipc_group_proto_xmit+0x14a/0x890 [ 410.175682][T11639] ? kmem_cache_free+0x2c3/0x2e0 [ 410.180459][T11639] tipc_group_delete+0x123/0x430 [ 410.185229][T11639] ? kfree_skbmem+0x104/0x170 [ 410.189749][T11639] ? tipc_group_update_member+0x3f0/0x3f0 [ 410.195383][T11639] ? __tipc_shutdown+0x122d/0x1510 [ 410.200424][T11639] ? tipc_group_self+0x27/0x1d0 [ 410.205102][T11639] tipc_sk_leave+0x1b8/0x700 [ 410.209529][T11639] ? sock_init_data+0xc0/0xc0 [ 410.214045][T11639] ? __tipc_shutdown+0x1510/0x1510 [ 410.218992][T11639] ? kasan_record_aux_stack+0xe/0x10 [ 410.224119][T11639] ? task_work_add+0x27/0x1d0 [ 410.228624][T11639] ? fput+0x1a/0x20 [ 410.232268][T11639] ? filp_close+0x106/0x150 [ 410.236606][T11639] ? close_fd+0x74/0x80 [ 410.240687][T11639] ? locks_remove_posix+0x610/0x610 [ 410.245726][T11639] tipc_release+0x110/0x1300 [ 410.250154][T11639] ? rwsem_write_trylock+0x153/0x340 [ 410.255269][T11639] ? tipc_sock_destruct+0x190/0x190 [ 410.260311][T11639] sock_close+0xdf/0x270 [ 410.264385][T11639] ? sock_mmap+0xa0/0xa0 [ 410.268464][T11639] __fput+0x3fe/0x910 [ 410.272288][T11639] ____fput+0x15/0x20 [ 410.276104][T11639] task_work_run+0x129/0x190 [ 410.280528][T11639] exit_to_user_mode_loop+0xc4/0xe0 [ 410.285560][T11639] exit_to_user_mode_prepare+0x5a/0xa0 [ 410.290859][T11639] syscall_exit_to_user_mode+0x26/0x160 [ 410.296238][T11639] do_syscall_64+0x49/0xb0 [ 410.300489][T11639] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 410.306214][T11639] RIP: 0033:0x7f8c48a67299 [ 410.310469][T11639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 410.329911][T11639] RSP: 002b:00007f8c476e7048 EFLAGS: 00000246 ORIG_RAX: 0000000000000003 [ 410.338156][T11639] RAX: 0000000000000000 RBX: 00007f8c48bf5f80 RCX: 00007f8c48a67299 [ 410.345967][T11639] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 410.353864][T11639] RBP: 00007f8c476e70a0 R08: 0000000000000000 R09: 0000000000000000 [ 410.361678][T11639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 410.369494][T11639] R13: 000000000000000b R14: 00007f8c48bf5f80 R15: 00007ffdfdcf65d8 [ 410.377483][T11639] [ 410.413044][ T30] audit: type=1400 audit(1722038716.480:146): avc: denied { unlink } for pid=82 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 412.691789][ T30] audit: type=1400 audit(1722038718.790:147): avc: denied { create } for pid=11721 comm="syz.2.4492" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 413.420547][T11751] FAULT_INJECTION: forcing a failure. [ 413.420547][T11751] name failslab, interval 1, probability 0, space 0, times 0 [ 413.438846][T11751] CPU: 1 PID: 11751 Comm: syz.2.4504 Not tainted 5.15.151-syzkaller-00127-g4edafe6c0231 #0 [ 413.448907][T11751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 413.458728][T11751] Call Trace: [ 413.461855][T11751] [ 413.464633][T11751] dump_stack_lvl+0x151/0x1b7 [ 413.469147][T11751] ? io_uring_drop_tctx_refs+0x190/0x190 [ 413.474704][T11751] dump_stack+0x15/0x17 [ 413.478693][T11751] should_fail+0x3c6/0x510 [ 413.482947][T11751] __should_failslab+0xa4/0xe0 [ 413.487631][T11751] ? __alloc_skb+0xbe/0x550 [ 413.491968][T11751] should_failslab+0x9/0x20 [ 413.496309][T11751] slab_pre_alloc_hook+0x37/0xd0 [ 413.501084][T11751] ? __alloc_skb+0xbe/0x550 [ 413.505425][T11751] kmem_cache_alloc+0x44/0x200 [ 413.510027][T11751] __alloc_skb+0xbe/0x550 [ 413.514191][T11751] alloc_skb_with_frags+0xa6/0x680 [ 413.519137][T11751] ? 0xffffffffa0026a08 [ 413.523137][T11751] ? is_bpf_text_address+0x172/0x190 [ 413.528253][T11751] ? stack_trace_save+0x1c0/0x1c0 [ 413.533113][T11751] sock_alloc_send_pskb+0x915/0xa50 [ 413.538150][T11751] ? sock_kzfree_s+0x60/0x60 [ 413.542571][T11751] ? stack_trace_snprint+0xf0/0xf0 [ 413.547520][T11751] ? __stack_depot_save+0x34/0x470 [ 413.552465][T11751] tun_get_user+0xf1b/0x3aa0 [ 413.556894][T11751] ? kasan_set_track+0x4b/0x70 [ 413.561493][T11751] ? kasan_set_free_info+0x23/0x40 [ 413.566452][T11751] ? _kstrtoull+0x3a0/0x4a0 [ 413.570787][T11751] ? tun_do_read+0x1ef0/0x1ef0 [ 413.575380][T11751] ? kstrtouint_from_user+0x20a/0x2a0 [ 413.580598][T11751] ? kstrtol_from_user+0x310/0x310 [ 413.585538][T11751] ? bpf_trace_run3+0x123/0x250 [ 413.590233][T11751] ? avc_policy_seqno+0x1b/0x70 [ 413.594925][T11751] ? selinux_file_permission+0x2c4/0x570 [ 413.600379][T11751] tun_chr_write_iter+0x1e1/0x2e0 [ 413.605247][T11751] vfs_write+0xd5d/0x1110 [ 413.609401][T11751] ? kmem_cache_free+0x2c3/0x2e0 [ 413.614179][T11751] ? file_end_write+0x1c0/0x1c0 [ 413.618871][T11751] ? __fdget_pos+0x209/0x3a0 [ 413.623286][T11751] ? ksys_write+0x77/0x2c0 [ 413.627546][T11751] ksys_write+0x199/0x2c0 [ 413.631710][T11751] ? __ia32_sys_read+0x90/0x90 [ 413.636310][T11751] ? debug_smp_processor_id+0x17/0x20 [ 413.641522][T11751] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 413.647508][T11751] __x64_sys_write+0x7b/0x90 [ 413.651931][T11751] do_syscall_64+0x3d/0xb0 [ 413.656183][T11751] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 413.661912][T11751] RIP: 0033:0x7fb8a348f299 [ 413.666165][T11751] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 413.685615][T11751] RSP: 002b:00007fb8a210f048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 413.693850][T11751] RAX: ffffffffffffffda RBX: 00007fb8a361df80 RCX: 00007fb8a348f299 [ 413.701663][T11751] RDX: 000000000000fdef RSI: 0000000020000300 RDI: 00000000000000c8 [ 413.709473][T11751] RBP: 00007fb8a210f0a0 R08: 0000000000000000 R09: 0000000000000000 [ 413.717286][T11751] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 413.725095][T11751] R13: 000000000000000b R14: 00007fb8a361df80 R15: 00007ffc01fe5858 [ 413.732917][T11751] [ 414.559130][ T30] audit: type=1400 audit(1722038720.660:148): avc: denied { tracepoint } for pid=11788 comm="syz.0.4520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 415.079245][T11835] FAULT_INJECTION: forcing a failure. [ 415.079245][T11835] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 415.153867][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 415.167001][T11835] CPU: 0 PID: 11835 Comm: syz.3.4533 Not tainted 5.15.151-syzkaller-00127-g4edafe6c0231 #0 [ 415.175424][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 415.176806][T11835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 415.176820][T11835] Call Trace: [ 415.176826][T11835] [ 415.176833][T11835] dump_stack_lvl+0x151/0x1b7 [ 415.204156][T11835] ? io_uring_drop_tctx_refs+0x190/0x190 [ 415.209620][T11835] ? kstrtouint_from_user+0x20a/0x2a0 [ 415.214827][T11835] ? kstrtol_from_user+0x310/0x310 [ 415.219774][T11835] ? avc_has_perm_noaudit+0x348/0x430 [ 415.224982][T11835] dump_stack+0x15/0x17 [ 415.228971][T11835] should_fail+0x3c6/0x510 [ 415.233229][T11835] should_fail_usercopy+0x1a/0x20 [ 415.238090][T11835] strncpy_from_user+0x24/0x2d0 [ 415.242773][T11835] bpf_prog_load+0x185/0x1b50 [ 415.247290][T11835] ? map_freeze+0x370/0x370 [ 415.251631][T11835] ? selinux_bpf+0xcb/0x100 [ 415.255965][T11835] ? security_bpf+0x82/0xb0 [ 415.260309][T11835] __sys_bpf+0x4bc/0x760 [ 415.264383][T11835] ? fput_many+0x160/0x1b0 [ 415.268638][T11835] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 415.273850][T11835] ? debug_smp_processor_id+0x17/0x20 [ 415.279073][T11835] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 415.284956][T11835] __x64_sys_bpf+0x7c/0x90 [ 415.289213][T11835] do_syscall_64+0x3d/0xb0 [ 415.293464][T11835] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 415.299200][T11835] RIP: 0033:0x7f43aff9a299 [ 415.303445][T11835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 415.322884][T11835] RSP: 002b:00007f43aec1a048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 415.331128][T11835] RAX: ffffffffffffffda RBX: 00007f43b0128f80 RCX: 00007f43aff9a299 [ 415.338938][T11835] RDX: 0000000000000048 RSI: 00000000200017c0 RDI: 0000000000000005 [ 415.346752][T11835] RBP: 00007f43aec1a0a0 R08: 0000000000000000 R09: 0000000000000000 [ 415.354564][T11835] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 415.362390][T11835] R13: 000000000000000b R14: 00007f43b0128f80 R15: 00007ffea0106368 [ 415.370208][T11835] [ 415.373836][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 416.440185][T11877] device syzkaller0 entered promiscuous mode [ 417.237763][T11919] syz.3.4562[11919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 417.237864][T11919] syz.3.4562[11919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 417.260685][T11919] syz.3.4562[11919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 417.277154][T11919] syz.3.4562[11919] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 418.374744][T11964] device syzkaller0 entered promiscuous mode [ 418.425361][T11971] device pim6reg1 entered promiscuous mode [ 419.532912][T12001] device syzkaller0 entered promiscuous mode [ 419.838685][T12021] device syzkaller0 entered promiscuous mode [ 421.330520][T12055] device syzkaller0 entered promiscuous mode [ 422.333465][T12090] device pim6reg1 entered promiscuous mode [ 423.587633][T12132] device pim6reg1 entered promiscuous mode [ 425.030781][T12190] device pim6reg1 entered promiscuous mode [ 425.090069][ T30] audit: type=1400 audit(1722038731.190:149): avc: denied { create } for pid=12193 comm="syz.1.4660" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 436.022811][T12563] device pim6reg1 entered promiscuous mode [ 436.140990][T12563] device veth0_vlan left promiscuous mode [ 436.186423][T12563] device veth0_vlan entered promiscuous mode [ 436.382850][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 436.430772][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 436.528025][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 440.975723][T12707] device pim6reg1 entered promiscuous mode [ 441.053032][T12707] device veth0_vlan left promiscuous mode [ 441.113193][T12707] device veth0_vlan entered promiscuous mode [ 441.175980][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 441.244511][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 441.328335][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 442.497980][T12743] bridge0: port 1(bridge_slave_0) entered blocking state [ 442.504973][T12743] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.547439][T12743] device bridge_slave_0 entered promiscuous mode [ 442.663493][T12743] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.670905][T12743] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.747707][T12743] device bridge_slave_1 entered promiscuous mode [ 443.452184][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 443.467233][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 443.512703][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 443.547948][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 443.592376][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.599278][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 443.727081][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 443.735282][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 443.743601][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.750478][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 443.770655][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 443.803276][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 443.811473][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 443.833985][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 443.846695][T12743] device veth0_vlan entered promiscuous mode [ 443.868501][ T2677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 443.917811][ T2677] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 443.925487][ T2677] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 444.057188][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 444.089105][T12743] device veth1_macvtap entered promiscuous mode [ 444.165696][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 444.186332][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 444.305070][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 444.339844][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 444.538517][ T45] device bridge_slave_1 left promiscuous mode [ 444.550778][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.628610][ T45] device bridge_slave_0 left promiscuous mode [ 444.699798][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.808068][ T45] device veth1_macvtap left promiscuous mode [ 444.813919][ T45] device veth0_vlan left promiscuous mode [ 446.798618][T12895] device syzkaller0 entered promiscuous mode [ 449.124316][T12985] device veth0_vlan left promiscuous mode [ 449.163363][T12985] device veth0_vlan entered promiscuous mode [ 455.891633][T13203] bridge0: port 2(bridge_slave_1) entered disabled state [ 455.898715][T13203] bridge0: port 1(bridge_slave_0) entered disabled state [ 455.923900][T13203] bridge0: port 2(bridge_slave_1) entered blocking state [ 455.931488][T13203] bridge0: port 2(bridge_slave_1) entered forwarding state [ 455.940670][T13203] bridge0: port 1(bridge_slave_0) entered blocking state [ 455.947960][T13203] bridge0: port 1(bridge_slave_0) entered forwarding state [ 455.987405][T13203] device bridge0 entered promiscuous mode [ 457.027863][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 458.979922][T13309] bridge0: port 2(bridge_slave_1) entered disabled state [ 458.987011][T13309] bridge0: port 1(bridge_slave_0) entered disabled state [ 460.335368][T13345] bridge0: port 2(bridge_slave_1) entered blocking state [ 460.342470][T13345] bridge0: port 2(bridge_slave_1) entered forwarding state [ 460.352136][T13345] bridge0: port 1(bridge_slave_0) entered blocking state [ 460.359610][T13345] bridge0: port 1(bridge_slave_0) entered forwarding state [ 460.402858][T13345] device bridge0 entered promiscuous mode [ 461.157047][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 481.200935][T13872] syz.4.5304[13872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 481.201018][T13872] syz.4.5304[13872] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 482.699708][T13909] syz.0.5319[13909] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 482.739440][T13909] syz.0.5319[13909] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 486.980821][T14056] device veth0_vlan left promiscuous mode [ 486.998845][T14056] device veth0_vlan entered promiscuous mode [ 487.014184][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 487.027684][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 487.109031][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 491.417907][ T30] audit: type=1400 audit(1722038797.520:150): avc: denied { create } for pid=14270 comm="syz.2.5468" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=appletalk_socket permissive=1 [ 491.957255][T14294] bridge0: port 2(bridge_slave_1) entered disabled state [ 491.964231][T14294] bridge0: port 1(bridge_slave_0) entered disabled state [ 491.973036][T14294] device bridge0 left promiscuous mode [ 492.055869][T14297] device bridge_slave_1 left promiscuous mode [ 492.093189][T14297] bridge0: port 2(bridge_slave_1) entered disabled state [ 492.204786][T14297] device bridge_slave_0 left promiscuous mode [ 492.213831][T14297] bridge0: port 1(bridge_slave_0) entered disabled state [ 492.456000][T14308] FAULT_INJECTION: forcing a failure. [ 492.456000][T14308] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 492.567017][T14308] CPU: 1 PID: 14308 Comm: syz.4.5482 Not tainted 5.15.151-syzkaller-00127-g4edafe6c0231 #0 [ 492.576927][T14308] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 492.586990][T14308] Call Trace: [ 492.590112][T14308] [ 492.592890][T14308] dump_stack_lvl+0x151/0x1b7 [ 492.597406][T14308] ? io_uring_drop_tctx_refs+0x190/0x190 [ 492.602877][T14308] dump_stack+0x15/0x17 [ 492.606868][T14308] should_fail+0x3c6/0x510 [ 492.611121][T14308] should_fail_usercopy+0x1a/0x20 [ 492.615977][T14308] strncpy_from_user+0x24/0x2d0 [ 492.620671][T14308] ? kmem_cache_alloc+0xf5/0x200 [ 492.625438][T14308] getname_flags+0xf2/0x520 [ 492.629777][T14308] ? __bpf_trace_sys_enter+0x62/0x70 [ 492.634904][T14308] __x64_sys_mkdir+0x5f/0x80 [ 492.639584][T14308] do_syscall_64+0x3d/0xb0 [ 492.643840][T14308] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 492.649564][T14308] RIP: 0033:0x7f8c48a67299 [ 492.653821][T14308] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 492.673435][T14308] RSP: 002b:00007f8c476e7048 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 492.681683][T14308] RAX: ffffffffffffffda RBX: 00007f8c48bf5f80 RCX: 00007f8c48a67299 [ 492.689490][T14308] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 492.697389][T14308] RBP: 00007f8c476e70a0 R08: 0000000000000000 R09: 0000000000000000 [ 492.705202][T14308] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 492.713027][T14308] R13: 000000000000000b R14: 00007f8c48bf5f80 R15: 00007ffdfdcf65d8 [ 492.720832][T14308] [ 493.242012][T14334] bridge0: port 2(bridge_slave_1) entered disabled state [ 493.249069][T14334] bridge0: port 1(bridge_slave_0) entered disabled state [ 494.009658][T14370] bridge0: port 4(veth0_vlan) entered disabled state [ 494.027738][T14370] device veth0_to_batadv left promiscuous mode [ 494.033967][T14370] bridge0: port 3(veth0_to_batadv) entered disabled state [ 494.064920][T14370] device bridge_slave_1 left promiscuous mode [ 494.077726][T14370] bridge0: port 2(bridge_slave_1) entered disabled state [ 494.109534][T14370] device bridge_slave_0 left promiscuous mode [ 494.115811][T14370] bridge0: port 1(bridge_slave_0) entered disabled state [ 495.067085][T14387] bridge0: port 1(bridge_slave_0) entered blocking state [ 495.098827][T14387] bridge0: port 1(bridge_slave_0) entered disabled state [ 495.106229][T14387] device bridge_slave_0 entered promiscuous mode [ 495.203714][T14387] bridge0: port 2(bridge_slave_1) entered blocking state [ 495.210987][T14387] bridge0: port 2(bridge_slave_1) entered disabled state [ 495.220863][T14387] device bridge_slave_1 entered promiscuous mode [ 496.038676][T14421] device veth0_vlan left promiscuous mode [ 496.046631][T14421] device veth0_vlan entered promiscuous mode [ 496.162986][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 496.192335][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 496.253734][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 496.333144][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 496.352151][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 496.359023][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 496.366665][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 496.374947][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 496.383418][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 496.390300][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 496.417027][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 496.425198][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 496.437425][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 496.445192][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 496.487199][T14435] bridge0: port 2(bridge_slave_1) entered disabled state [ 496.494113][T14435] bridge0: port 1(bridge_slave_0) entered disabled state [ 496.657279][T14435] device bridge0 left promiscuous mode [ 496.788142][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 496.800407][T14387] device veth0_vlan entered promiscuous mode [ 496.812992][T14439] device bridge_slave_1 left promiscuous mode [ 496.821069][T14439] bridge0: port 2(bridge_slave_1) entered disabled state [ 496.828674][T14439] device bridge_slave_0 left promiscuous mode [ 496.834754][T14439] bridge0: port 1(bridge_slave_0) entered disabled state [ 496.907721][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 496.916664][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 496.927027][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 496.934279][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 497.060304][T14387] device veth1_macvtap entered promiscuous mode [ 497.076986][ T2677] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 497.089286][ T2677] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 497.105912][ T2677] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 497.181183][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 497.194989][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 497.204204][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 497.212330][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 501.143574][T14582] device veth0_vlan left promiscuous mode [ 501.149902][T14582] device veth0_vlan entered promiscuous mode [ 503.780756][ T30] audit: type=1400 audit(1722038809.880:151): avc: denied { create } for pid=14678 comm="syz.0.5630" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 504.102573][T14693] syz.0.5636[14693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.102672][T14693] syz.0.5636[14693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.293276][T14693] syz.0.5636[14693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.518786][T14698] syz.0.5636[14698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.683751][T14698] syz.0.5636[14698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.689541][T14693] syz.0.5636[14693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 504.958081][T14716] device syzkaller0 entered promiscuous mode [ 511.714084][T14880] bridge0: port 2(bridge_slave_1) entered blocking state [ 511.720989][T14880] bridge0: port 2(bridge_slave_1) entered forwarding state [ 511.728194][T14880] bridge0: port 1(bridge_slave_0) entered blocking state [ 511.735044][T14880] bridge0: port 1(bridge_slave_0) entered forwarding state [ 511.743677][T14880] device bridge0 entered promiscuous mode [ 511.756396][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 517.814430][T14991] tap0: tun_chr_ioctl cmd 1074025692 [ 525.190920][T15160] device syzkaller0 entered promiscuous mode [ 525.201790][ T2678] syzkaller0: tun_net_xmit 48 [ 525.218117][T15160] syzkaller0: tun_chr_ioctl cmd 2147767520 [ 525.224085][T15160] syzkaller0: tun_chr_ioctl cmd 1074025677 [ 525.267807][T15160] syzkaller0: Linktype set failed because interface is up [ 525.399430][T15160] syzkaller0: tun_net_xmit 1280 [ 540.997428][T15485] device pim6reg1 entered promiscuous mode [ 548.173592][T15634] bridge0: port 1(bridge_slave_0) entered blocking state [ 548.181649][T15634] bridge0: port 1(bridge_slave_0) entered disabled state [ 548.189301][T15634] device bridge_slave_0 entered promiscuous mode [ 548.207678][T15634] bridge0: port 2(bridge_slave_1) entered blocking state [ 548.214587][T15634] bridge0: port 2(bridge_slave_1) entered disabled state [ 548.222848][T15634] device bridge_slave_1 entered promiscuous mode [ 548.965705][ T30] audit: type=1400 audit(1722038855.060:152): avc: denied { create } for pid=15676 comm="syz.1.6007" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 549.064542][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 549.103362][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 549.142064][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 549.180696][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 549.224427][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 549.281768][ T2675] bridge0: port 1(bridge_slave_0) entered blocking state [ 549.288681][ T2675] bridge0: port 1(bridge_slave_0) entered forwarding state [ 549.322903][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 549.331218][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 549.339494][ T2675] bridge0: port 2(bridge_slave_1) entered blocking state [ 549.346352][ T2675] bridge0: port 2(bridge_slave_1) entered forwarding state [ 549.444142][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 549.487639][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 549.522506][T15634] device veth0_vlan entered promiscuous mode [ 549.542291][T15682] device syzkaller0 entered promiscuous mode [ 549.552069][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 549.565887][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 549.574375][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 549.582393][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 549.638429][T15634] device veth1_macvtap entered promiscuous mode [ 549.704234][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 549.717773][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 549.734818][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 549.750848][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 549.799970][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 549.931906][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 549.949068][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 549.997514][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 550.025763][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 550.155369][ T10] device veth1_macvtap left promiscuous mode [ 550.168202][ T10] device veth0_vlan left promiscuous mode [ 552.169194][T15734] device veth0_vlan left promiscuous mode [ 552.175083][T15734] device veth0_vlan entered promiscuous mode [ 552.240442][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 552.307122][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 552.314517][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 567.835877][T15978] bridge0: port 2(bridge_slave_1) entered disabled state [ 567.842930][T15978] bridge0: port 1(bridge_slave_0) entered disabled state [ 567.927078][T15978] device bridge0 left promiscuous mode [ 568.007042][T15979] bridge0: port 2(bridge_slave_1) entered blocking state [ 568.013942][T15979] bridge0: port 2(bridge_slave_1) entered forwarding state [ 568.021167][T15979] bridge0: port 1(bridge_slave_0) entered blocking state [ 568.028033][T15979] bridge0: port 1(bridge_slave_0) entered forwarding state [ 568.064228][T15979] device bridge0 entered promiscuous mode [ 573.405885][T16076] bridge0: port 1(bridge_slave_0) entered blocking state [ 573.422907][T16076] bridge0: port 1(bridge_slave_0) entered disabled state [ 573.440415][T16076] device bridge_slave_0 entered promiscuous mode [ 573.497837][T16076] bridge0: port 2(bridge_slave_1) entered blocking state [ 573.504701][T16076] bridge0: port 2(bridge_slave_1) entered disabled state [ 573.522028][T16076] device bridge_slave_1 entered promiscuous mode [ 574.188474][ T327] device bridge_slave_1 left promiscuous mode [ 574.197068][ T327] bridge0: port 2(bridge_slave_1) entered disabled state [ 574.244063][ T327] device bridge_slave_0 left promiscuous mode [ 574.299347][ T327] bridge0: port 1(bridge_slave_0) entered disabled state [ 574.497900][ T327] device veth1_macvtap left promiscuous mode [ 574.503786][ T327] device veth0_vlan left promiscuous mode [ 575.600094][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 575.620372][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 575.749246][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 575.782727][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 575.875234][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 575.882130][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 576.020998][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 576.071718][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 576.132250][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 576.139138][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 576.161638][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 576.169756][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 576.177871][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 576.185876][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 576.194031][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 576.265630][T16157] device pim6reg1 entered promiscuous mode [ 576.459771][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 576.488579][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 576.496774][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 576.537320][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 576.616012][T16076] device veth0_vlan entered promiscuous mode [ 576.624874][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 576.632333][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 576.653815][T16076] device veth1_macvtap entered promiscuous mode [ 576.728535][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 576.736622][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 576.756181][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 576.899851][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 576.911808][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 576.957878][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 576.986903][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 577.962106][T16176] bridge0: port 1(bridge_slave_0) entered blocking state [ 577.998576][T16176] bridge0: port 1(bridge_slave_0) entered disabled state [ 578.005971][T16176] device bridge_slave_0 entered promiscuous mode [ 578.117317][T16176] bridge0: port 2(bridge_slave_1) entered blocking state [ 578.124190][T16176] bridge0: port 2(bridge_slave_1) entered disabled state [ 578.203199][T16176] device bridge_slave_1 entered promiscuous mode [ 579.416097][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 579.427131][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 579.443271][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 579.457149][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 579.481344][T13507] bridge0: port 1(bridge_slave_0) entered blocking state [ 579.488241][T13507] bridge0: port 1(bridge_slave_0) entered forwarding state [ 579.553578][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 579.564548][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 579.575618][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 579.628913][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 579.635776][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 579.713698][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 579.727472][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 579.735478][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 579.743816][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 579.886965][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 579.895230][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 579.905772][T16176] device veth0_vlan entered promiscuous mode [ 579.927297][ T327] device bridge_slave_1 left promiscuous mode [ 579.957795][ T327] bridge0: port 2(bridge_slave_1) entered disabled state [ 580.007605][ T327] device bridge_slave_0 left promiscuous mode [ 580.054070][ T327] bridge0: port 1(bridge_slave_0) entered disabled state [ 580.114759][ T327] device veth1_macvtap left promiscuous mode [ 580.155272][ T327] device veth0_vlan left promiscuous mode [ 580.493542][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 580.505976][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 580.616120][T16176] device veth1_macvtap entered promiscuous mode [ 580.626380][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 580.692514][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 580.797305][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 580.805405][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 580.869907][ T30] audit: type=1400 audit(1722038886.970:153): avc: denied { create } for pid=16231 comm="syz.0.6206" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_iscsi_socket permissive=1 [ 580.900409][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 580.930519][ T30] audit: type=1400 audit(1722038887.010:154): avc: denied { append } for pid=82 comm="syslogd" name="messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 580.958734][ T30] audit: type=1400 audit(1722038887.010:155): avc: denied { open } for pid=82 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 580.998778][ T30] audit: type=1400 audit(1722038887.010:156): avc: denied { getattr } for pid=82 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=7 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 581.108755][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 581.217263][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 581.307714][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 581.380707][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 583.905366][T16255] bridge0: port 1(bridge_slave_0) entered blocking state [ 583.916676][T16255] bridge0: port 1(bridge_slave_0) entered disabled state [ 583.928150][T16255] device bridge_slave_0 entered promiscuous mode [ 583.994925][T16255] bridge0: port 2(bridge_slave_1) entered blocking state [ 584.017693][T16255] bridge0: port 2(bridge_slave_1) entered disabled state [ 584.028686][T16255] device bridge_slave_1 entered promiscuous mode [ 584.382841][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 584.390701][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 584.425693][T14494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 584.447247][T14494] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 584.578203][T14494] bridge0: port 1(bridge_slave_0) entered blocking state [ 584.585057][T14494] bridge0: port 1(bridge_slave_0) entered forwarding state [ 584.745061][T14494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 584.794437][T14494] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 584.807172][T14494] bridge0: port 2(bridge_slave_1) entered blocking state [ 584.814051][T14494] bridge0: port 2(bridge_slave_1) entered forwarding state [ 584.821823][T14494] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 584.829765][T14494] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 584.882284][ T327] device bridge_slave_1 left promiscuous mode [ 584.899686][ T327] bridge0: port 2(bridge_slave_1) entered disabled state [ 584.938688][ T327] device bridge_slave_0 left promiscuous mode [ 584.944649][ T327] bridge0: port 1(bridge_slave_0) entered disabled state [ 585.007061][ T327] device veth1_macvtap left promiscuous mode [ 585.041176][ T327] device veth0_vlan left promiscuous mode [ 585.518593][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 585.580790][ T2674] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 585.691992][T16255] device veth0_vlan entered promiscuous mode [ 585.798643][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 585.811762][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 585.834295][T16255] device veth1_macvtap entered promiscuous mode [ 585.896988][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 585.957246][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 586.037591][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 586.045762][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 586.118395][ T2678] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 586.283693][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 586.305948][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 586.385306][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 586.449564][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 588.094481][T16324] bridge0: port 1(bridge_slave_0) entered blocking state [ 588.129069][T16324] bridge0: port 1(bridge_slave_0) entered disabled state [ 588.136434][T16324] device bridge_slave_0 entered promiscuous mode [ 588.209603][ T327] device bridge_slave_1 left promiscuous mode [ 588.215560][ T327] bridge0: port 2(bridge_slave_1) entered disabled state [ 588.273676][ T327] device bridge_slave_0 left promiscuous mode [ 588.313615][ T327] bridge0: port 1(bridge_slave_0) entered disabled state [ 588.343378][ T327] device veth1_macvtap left promiscuous mode [ 588.351482][ T327] device veth0_vlan left promiscuous mode [ 588.612341][T16324] bridge0: port 2(bridge_slave_1) entered blocking state [ 588.653450][T16324] bridge0: port 2(bridge_slave_1) entered disabled state [ 588.660929][T16324] device bridge_slave_1 entered promiscuous mode [ 589.854132][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 589.861803][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 589.962560][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 589.970889][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 589.979335][ T2705] bridge0: port 1(bridge_slave_0) entered blocking state [ 589.986208][ T2705] bridge0: port 1(bridge_slave_0) entered forwarding state [ 590.098556][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 590.106802][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 590.187888][ T2705] bridge0: port 2(bridge_slave_1) entered blocking state [ 590.194773][ T2705] bridge0: port 2(bridge_slave_1) entered forwarding state [ 590.202401][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 590.210379][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 590.249282][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 590.256702][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 590.264810][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 590.327229][T16366] device pim6reg1 entered promiscuous mode [ 590.477793][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 590.486052][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 590.623247][T16324] device veth0_vlan entered promiscuous mode [ 590.639137][T16324] device veth1_macvtap entered promiscuous mode [ 591.001250][T16376] device syzkaller0 entered promiscuous mode [ 591.165780][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 591.207304][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 591.215261][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 591.276377][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 591.284478][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 591.291999][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 591.300217][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 591.308455][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 591.316535][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 591.337562][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 591.344920][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 591.929101][ T327] device bridge_slave_1 left promiscuous mode [ 591.935157][ T327] bridge0: port 2(bridge_slave_1) entered disabled state [ 592.069632][ T327] device bridge_slave_0 left promiscuous mode [ 592.095849][ T327] bridge0: port 1(bridge_slave_0) entered disabled state [ 592.168897][ T327] device veth1_macvtap left promiscuous mode [ 592.174813][ T327] device veth0_vlan left promiscuous mode [ 593.706425][T16386] bridge0: port 1(bridge_slave_0) entered blocking state [ 593.755002][T16386] bridge0: port 1(bridge_slave_0) entered disabled state [ 593.806309][T16386] device bridge_slave_0 entered promiscuous mode [ 593.947050][T16386] bridge0: port 2(bridge_slave_1) entered blocking state [ 593.955795][T16386] bridge0: port 2(bridge_slave_1) entered disabled state [ 593.967851][T16386] device bridge_slave_1 entered promiscuous mode [ 594.055950][T16412] device pim6reg1 entered promiscuous mode [ 595.082872][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 595.122723][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 595.218414][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 595.247396][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 595.256011][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 595.262876][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 595.362639][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 595.415587][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 595.423914][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 595.430771][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 595.538070][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 595.545645][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 595.698581][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 595.706454][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 595.862532][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 595.963152][T16386] device veth0_vlan entered promiscuous mode [ 596.158526][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 596.166764][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 596.248729][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 596.262563][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 596.285565][T16386] device veth1_macvtap entered promiscuous mode [ 596.391420][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 596.398838][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 596.470268][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 596.531019][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 596.587569][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 596.675734][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 596.709733][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 596.758262][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 596.784930][ T450] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 596.796671][T16445] device pim6reg1 entered promiscuous mode [ 597.867571][ T45] device bridge_slave_1 left promiscuous mode [ 597.877497][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 598.057420][ T45] device bridge_slave_0 left promiscuous mode [ 598.063397][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 598.217180][ T45] device veth1_macvtap left promiscuous mode [ 598.225266][ T45] device veth0_vlan left promiscuous mode [ 598.249223][T16473] FAULT_INJECTION: forcing a failure. [ 598.249223][T16473] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 598.282616][T16473] CPU: 1 PID: 16473 Comm: syz.2.6285 Not tainted 5.15.151-syzkaller-00127-g4edafe6c0231 #0 [ 598.292429][T16473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 598.302326][T16473] Call Trace: [ 598.305447][T16473] [ 598.308228][T16473] dump_stack_lvl+0x151/0x1b7 [ 598.312828][T16473] ? io_uring_drop_tctx_refs+0x190/0x190 [ 598.318295][T16473] ? kstrtouint_from_user+0x20a/0x2a0 [ 598.323525][T16473] ? kstrtol_from_user+0x310/0x310 [ 598.328449][T16473] ? avc_has_perm_noaudit+0x348/0x430 [ 598.333756][T16473] dump_stack+0x15/0x17 [ 598.337744][T16473] should_fail+0x3c6/0x510 [ 598.342000][T16473] should_fail_usercopy+0x1a/0x20 [ 598.346944][T16473] strncpy_from_user+0x24/0x2d0 [ 598.351643][T16473] bpf_prog_load+0x185/0x1b50 [ 598.356146][T16473] ? map_freeze+0x370/0x370 [ 598.360492][T16473] ? selinux_bpf+0xcb/0x100 [ 598.364823][T16473] ? security_bpf+0x82/0xb0 [ 598.369162][T16473] __sys_bpf+0x4bc/0x760 [ 598.373242][T16473] ? fput_many+0x160/0x1b0 [ 598.377495][T16473] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 598.382708][T16473] ? debug_smp_processor_id+0x17/0x20 [ 598.387997][T16473] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 598.393907][T16473] __x64_sys_bpf+0x7c/0x90 [ 598.398154][T16473] do_syscall_64+0x3d/0xb0 [ 598.402491][T16473] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 598.408221][T16473] RIP: 0033:0x7fc733f73299 [ 598.412474][T16473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 598.432001][T16473] RSP: 002b:00007fc732bf3048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 598.440246][T16473] RAX: ffffffffffffffda RBX: 00007fc734101f80 RCX: 00007fc733f73299 [ 598.448057][T16473] RDX: 0000000000000070 RSI: 00000000200000c0 RDI: 0000000000000005 [ 598.455868][T16473] RBP: 00007fc732bf30a0 R08: 0000000000000000 R09: 0000000000000000 [ 598.463683][T16473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 598.471491][T16473] R13: 000000000000000b R14: 00007fc734101f80 R15: 00007ffe50faa888 [ 598.479408][T16473] [ 599.680812][T16486] device pim6reg1 entered promiscuous mode [ 599.692093][T16474] bridge0: port 1(bridge_slave_0) entered blocking state [ 599.700553][T16474] bridge0: port 1(bridge_slave_0) entered disabled state [ 599.708114][T16474] device bridge_slave_0 entered promiscuous mode [ 599.744033][T16474] bridge0: port 2(bridge_slave_1) entered blocking state [ 599.753521][T16474] bridge0: port 2(bridge_slave_1) entered disabled state [ 599.763825][T16474] device bridge_slave_1 entered promiscuous mode [ 600.917322][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 600.924694][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 601.137198][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 601.145445][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 601.218310][ T2705] bridge0: port 1(bridge_slave_0) entered blocking state [ 601.225173][ T2705] bridge0: port 1(bridge_slave_0) entered forwarding state [ 601.245270][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 601.370118][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 601.448278][ T2705] bridge0: port 2(bridge_slave_1) entered blocking state [ 601.455158][ T2705] bridge0: port 2(bridge_slave_1) entered forwarding state [ 601.528242][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 601.547363][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 601.555192][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 601.613118][T16474] device veth0_vlan entered promiscuous mode [ 601.665577][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 601.690836][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 601.782385][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 601.866467][ T2705] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 601.932532][T16474] device veth1_macvtap entered promiscuous mode [ 601.996550][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 602.133617][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 602.211021][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 602.259990][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 602.332722][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 602.465113][T14494] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 602.496470][T14494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 602.570319][T14494] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 602.617567][T14494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 603.707449][ T327] device bridge_slave_1 left promiscuous mode [ 603.713471][ T327] bridge0: port 2(bridge_slave_1) entered disabled state [ 603.721038][ T327] device bridge_slave_0 left promiscuous mode [ 603.727084][ T327] bridge0: port 1(bridge_slave_0) entered disabled state [ 603.735082][ T327] device veth1_macvtap left promiscuous mode [ 603.740988][ T327] device veth0_vlan left promiscuous mode [ 603.948362][T16556] device sit0 entered promiscuous mode [ 604.815740][T16557] bridge0: port 1(bridge_slave_0) entered blocking state [ 604.880091][T16557] bridge0: port 1(bridge_slave_0) entered disabled state [ 604.905068][T16557] device bridge_slave_0 entered promiscuous mode [ 605.015414][T16557] bridge0: port 2(bridge_slave_1) entered blocking state [ 605.078571][T16557] bridge0: port 2(bridge_slave_1) entered disabled state [ 605.166244][T16557] device bridge_slave_1 entered promiscuous mode [ 607.447102][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 607.454835][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 607.522414][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 607.530672][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 607.543321][ T2675] bridge0: port 1(bridge_slave_0) entered blocking state [ 607.550195][ T2675] bridge0: port 1(bridge_slave_0) entered forwarding state [ 607.557416][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 607.565542][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 607.573811][ T2675] bridge0: port 2(bridge_slave_1) entered blocking state [ 607.580654][ T2675] bridge0: port 2(bridge_slave_1) entered forwarding state [ 607.587970][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 607.595941][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 607.778092][T14494] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 607.943218][T14494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 608.158120][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 608.166150][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 608.175169][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 608.192786][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 608.201921][T16557] device veth0_vlan entered promiscuous mode [ 608.216248][T16557] device veth1_macvtap entered promiscuous mode [ 608.453469][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 608.461727][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 608.490564][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 608.567300][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 608.575450][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 608.719199][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 608.734049][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 609.359369][ T327] device bridge_slave_1 left promiscuous mode [ 609.367624][ T327] bridge0: port 2(bridge_slave_1) entered disabled state [ 609.477665][ T327] device bridge_slave_0 left promiscuous mode [ 609.483638][ T327] bridge0: port 1(bridge_slave_0) entered disabled state [ 609.537717][ T327] device veth1_macvtap left promiscuous mode [ 609.543656][ T327] device veth0_vlan left promiscuous mode [ 612.258125][T16638] bridge0: port 1(bridge_slave_0) entered blocking state [ 612.309494][T16638] bridge0: port 1(bridge_slave_0) entered disabled state [ 612.359777][T16638] device bridge_slave_0 entered promiscuous mode [ 612.451317][T16638] bridge0: port 2(bridge_slave_1) entered blocking state [ 612.463220][T16638] bridge0: port 2(bridge_slave_1) entered disabled state [ 612.470663][T16638] device bridge_slave_1 entered promiscuous mode [ 613.007309][T16638] bridge0: port 2(bridge_slave_1) entered blocking state [ 613.014187][T16638] bridge0: port 2(bridge_slave_1) entered forwarding state [ 613.021524][T16638] bridge0: port 1(bridge_slave_0) entered blocking state [ 613.028378][T16638] bridge0: port 1(bridge_slave_0) entered forwarding state [ 613.299330][T13507] bridge0: port 1(bridge_slave_0) entered disabled state [ 613.344992][T13507] bridge0: port 2(bridge_slave_1) entered disabled state [ 613.438755][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 613.446100][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 613.541721][T14494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 613.567932][T14494] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 613.575931][T14494] bridge0: port 1(bridge_slave_0) entered blocking state [ 613.582968][T14494] bridge0: port 1(bridge_slave_0) entered forwarding state [ 613.603758][T14494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 613.612039][T14494] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 613.620330][T14494] bridge0: port 2(bridge_slave_1) entered blocking state [ 613.627198][T14494] bridge0: port 2(bridge_slave_1) entered forwarding state [ 613.652515][T16685] device syzkaller0 entered promiscuous mode [ 613.820319][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 613.848721][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 613.856586][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 613.978387][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 613.988065][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 613.996405][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 614.016446][T16638] device veth0_vlan entered promiscuous mode [ 614.062575][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 614.071459][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 614.081270][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 614.088838][T13507] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 614.104515][T16638] device veth1_macvtap entered promiscuous mode [ 614.155117][T14494] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 614.167314][T14494] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 614.179266][T14494] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 614.252053][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 614.275827][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 614.346499][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 614.448324][ T2675] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 614.558256][T16709] device syzkaller0 entered promiscuous mode [ 614.644635][T16709] syz.0.6370[16709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 614.644739][T16709] syz.0.6370[16709] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 615.958534][T16730] bridge0: port 1(bridge_slave_0) entered blocking state [ 616.109680][T16730] bridge0: port 1(bridge_slave_0) entered disabled state [ 616.201444][T16730] device bridge_slave_0 entered promiscuous mode [ 616.208440][T16730] bridge0: port 2(bridge_slave_1) entered blocking state [ 616.215336][T16730] bridge0: port 2(bridge_slave_1) entered disabled state [ 616.222671][T16730] device bridge_slave_1 entered promiscuous mode [ 616.310667][ T45] device bridge_slave_1 left promiscuous mode [ 616.318161][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 616.348319][ T45] device bridge_slave_0 left promiscuous mode [ 616.455115][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 616.638064][ T45] device veth1_macvtap left promiscuous mode [ 616.692047][ T45] device veth0_vlan left promiscuous mode [ 618.200304][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 618.211188][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 618.218576][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 618.227137][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 618.235244][ T2673] bridge0: port 1(bridge_slave_0) entered blocking state [ 618.242120][ T2673] bridge0: port 1(bridge_slave_0) entered forwarding state [ 618.250038][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 618.258760][ T2673] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 618.267114][ T2673] bridge0: port 2(bridge_slave_1) entered blocking state [ 618.273961][ T2673] bridge0: port 2(bridge_slave_1) entered forwarding state [ 618.317942][T14494] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 618.343234][T16794] device syzkaller0 entered promiscuous mode [ 718.356817][ C0] rcu: INFO: rcu_preempt self-detected stall on CPU [ 718.363241][ C0] rcu: 0-...!: (10000 ticks this GP) idle=c4f/1/0x4000000000000000 softirq=63603/63603 fqs=0 last_accelerate: 7c0b/a320 dyntick_enabled: 1 [ 718.377306][ C0] (t=10002 jiffies g=79101 q=263) [ 718.382239][ C0] rcu: rcu_preempt kthread timer wakeup didn't happen for 10001 jiffies! g79101 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 [ 718.394391][ C0] rcu: Possible timer handling issue on cpu=0 timer-softirq=24960 [ 718.402116][ C0] rcu: rcu_preempt kthread starved for 10004 jiffies! g79101 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x402 ->cpu=0 [ 718.413313][ C0] rcu: Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior. [ 718.423120][ C0] rcu: RCU grace-period kthread stack dump: [ 718.428849][ C0] task:rcu_preempt state:I stack:28288 pid: 14 ppid: 2 flags:0x00004000 [ 718.437878][ C0] Call Trace: [ 718.441000][ C0] [ 718.443782][ C0] __schedule+0xccc/0x1590 [ 718.448039][ C0] ? __sched_text_start+0x8/0x8 [ 718.452718][ C0] ? __kasan_check_write+0x14/0x20 [ 718.457668][ C0] schedule+0x11f/0x1e0 [ 718.461657][ C0] schedule_timeout+0x18c/0x370 [ 718.466343][ C0] ? _raw_spin_unlock_irq+0x4e/0x70 [ 718.471383][ C0] ? console_conditional_schedule+0x30/0x30 [ 718.477123][ C0] ? update_process_times+0x200/0x200 [ 718.482315][ C0] ? prepare_to_swait_event+0x308/0x320 [ 718.487697][ C0] rcu_gp_fqs_loop+0x2af/0xf80 [ 718.492303][ C0] ? debug_smp_processor_id+0x17/0x20 [ 718.497506][ C0] ? __note_gp_changes+0x4ab/0x920 [ 718.502462][ C0] ? rcu_gp_init+0xc30/0xc30 [ 718.506877][ C0] ? _raw_spin_unlock_irq+0x4e/0x70 [ 718.511999][ C0] ? rcu_gp_init+0x9cf/0xc30 [ 718.516426][ C0] rcu_gp_kthread+0xa4/0x350 [ 718.520851][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 718.525536][ C0] ? wake_nocb_gp+0x1e0/0x1e0 [ 718.530052][ C0] ? __kasan_check_read+0x11/0x20 [ 718.534909][ C0] ? __kthread_parkme+0xb2/0x200 [ 718.539686][ C0] kthread+0x421/0x510 [ 718.543591][ C0] ? wake_nocb_gp+0x1e0/0x1e0 [ 718.548108][ C0] ? kthread_blkcg+0xd0/0xd0 [ 718.552530][ C0] ret_from_fork+0x1f/0x30 [ 718.556791][ C0] [ 718.559648][ C0] rcu: Stack dump where RCU GP kthread last ran: [ 718.565820][ C0] NMI backtrace for cpu 0 [ 718.569981][ C0] CPU: 0 PID: 16794 Comm: syz.3.6401 Not tainted 5.15.151-syzkaller-00127-g4edafe6c0231 #0 [ 718.579781][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 718.589676][ C0] Call Trace: [ 718.592803][ C0] [ 718.595495][ C0] dump_stack_lvl+0x151/0x1b7 [ 718.600007][ C0] ? io_uring_drop_tctx_refs+0x190/0x190 [ 718.605474][ C0] dump_stack+0x15/0x17 [ 718.609468][ C0] nmi_cpu_backtrace+0x2f7/0x300 [ 718.614241][ C0] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 718.620228][ C0] ? panic+0x751/0x751 [ 718.624136][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 718.630042][ C0] nmi_trigger_cpumask_backtrace+0x15d/0x270 [ 718.635852][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 718.641755][ C0] arch_trigger_cpumask_backtrace+0x10/0x20 [ 718.647485][ C0] rcu_check_gp_kthread_starvation+0x1e3/0x250 [ 718.653470][ C0] ? rcu_check_gp_kthread_expired_fqs_timer+0x18e/0x230 [ 718.660244][ C0] print_cpu_stall+0x310/0x5f0 [ 718.664934][ C0] rcu_sched_clock_irq+0x989/0x12f0 [ 718.669979][ C0] ? rcu_boost_kthread_setaffinity+0x340/0x340 [ 718.675968][ C0] ? hrtimer_run_queues+0x15f/0x440 [ 718.681004][ C0] update_process_times+0x198/0x200 [ 718.686035][ C0] tick_sched_timer+0x188/0x240 [ 718.690721][ C0] ? tick_setup_sched_timer+0x480/0x480 [ 718.696103][ C0] __hrtimer_run_queues+0x41a/0xad0 [ 718.701139][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 718.706084][ C0] ? clockevents_program_event+0x22f/0x300 [ 718.711728][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 718.717631][ C0] hrtimer_interrupt+0x40c/0xaa0 [ 718.722412][ C0] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 718.728131][ C0] sysvec_apic_timer_interrupt+0x95/0xc0 [ 718.733599][ C0] [ 718.736377][ C0] [ 718.739154][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 718.744970][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 718.749742][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 2b 02 13 04 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 718.769184][ C0] RSP: 0018:ffffc90000bdf2a0 EFLAGS: 00000246 [ 718.775085][ C0] RAX: 0000000000000001 RBX: 1ffff9200017be58 RCX: 1ffffffff0d5aa9c [ 718.782896][ C0] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7038ad4 [ 718.790706][ C0] RBP: ffffc90000bdf350 R08: dffffc0000000000 R09: ffffed103ee0715b [ 718.798526][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 718.806330][ C0] R13: ffff8881f7038ad4 R14: 0000000000000001 R15: 1ffff9200017be5c [ 718.814236][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 718.820218][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 718.825170][ C0] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 718.831082][ C0] ? get_page_from_freelist+0x3550/0x35d0 [ 718.836623][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 718.842872][ C0] ? 0xffffffffa0026940 [ 718.846868][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 718.851637][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 718.856672][ C0] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 718.861967][ C0] sock_hash_delete_elem+0xb1/0x2f0 [ 718.867002][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0x6c0 [ 718.872381][ C0] bpf_trace_run4+0x13f/0x270 [ 718.876896][ C0] ? bpf_trace_run3+0x250/0x250 [ 718.881588][ C0] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 718.886878][ C0] __alloc_pages+0x3cb/0x8f0 [ 718.891304][ C0] ? prep_new_page+0x110/0x110 [ 718.895908][ C0] kmalloc_order+0x4a/0x160 [ 718.900243][ C0] kmalloc_order_trace+0x1a/0xb0 [ 718.905018][ C0] ? tun_get_user+0x13b3/0x3aa0 [ 718.909705][ C0] __kmalloc_track_caller+0x19b/0x260 [ 718.914911][ C0] ? tun_get_user+0x13b3/0x3aa0 [ 718.919596][ C0] pskb_expand_head+0x113/0x1240 [ 718.924372][ C0] ? __napi_alloc_skb+0x174/0x2e0 [ 718.929235][ C0] tun_get_user+0x13b3/0x3aa0 [ 718.933743][ C0] ? __jump_label_update+0x36a/0x380 [ 718.938872][ C0] ? mutex_unlock+0xb2/0x260 [ 718.943292][ C0] ? cpus_read_unlock+0x68/0xa0 [ 718.947981][ C0] ? tun_do_read+0x1ef0/0x1ef0 [ 718.952577][ C0] ? tracepoint_add_func+0x77e/0x940 [ 718.957703][ C0] ? alloc_file_pseudo+0x280/0x2f0 [ 718.962649][ C0] ? __slab_free+0x130/0x290 [ 718.967074][ C0] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 718.971938][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 718.976968][ C0] ? preempt_count_add+0x92/0x1a0 [ 718.981829][ C0] ? avc_policy_seqno+0x1b/0x70 [ 718.986516][ C0] ? selinux_file_permission+0x2c4/0x570 [ 718.991982][ C0] tun_chr_write_iter+0x1e1/0x2e0 [ 718.996850][ C0] vfs_write+0xd5d/0x1110 [ 719.001011][ C0] ? map_freeze+0x370/0x370 [ 719.005353][ C0] ? file_end_write+0x1c0/0x1c0 [ 719.010040][ C0] ? __fdget_pos+0x209/0x3a0 [ 719.014464][ C0] ? ksys_write+0x77/0x2c0 [ 719.018725][ C0] ksys_write+0x199/0x2c0 [ 719.022882][ C0] ? __ia32_sys_read+0x90/0x90 [ 719.027485][ C0] ? __kasan_check_read+0x11/0x20 [ 719.032344][ C0] __x64_sys_write+0x7b/0x90 [ 719.036775][ C0] do_syscall_64+0x3d/0xb0 [ 719.041022][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 719.046763][ C0] RIP: 0033:0x7f43aff9a299 [ 719.051093][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 719.070621][ C0] RSP: 002b:00007f43aec1a048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 719.078864][ C0] RAX: ffffffffffffffda RBX: 00007f43b0128f80 RCX: 00007f43aff9a299 [ 719.086679][ C0] RDX: 000000000000fdef RSI: 0000000020000380 RDI: 0000000000000006 [ 719.094490][ C0] RBP: 00007f43b00078e6 R08: 0000000000000000 R09: 0000000000000000 [ 719.102297][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 719.110109][ C0] R13: 000000000000000b R14: 00007f43b0128f80 R15: 00007ffea0106368 [ 719.117926][ C0] [ 719.120806][ C0] NMI backtrace for cpu 0 [ 719.124951][ C0] CPU: 0 PID: 16794 Comm: syz.3.6401 Not tainted 5.15.151-syzkaller-00127-g4edafe6c0231 #0 [ 719.134759][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 719.144652][ C0] Call Trace: [ 719.147779][ C0] [ 719.150476][ C0] dump_stack_lvl+0x151/0x1b7 [ 719.154982][ C0] ? io_uring_drop_tctx_refs+0x190/0x190 [ 719.160450][ C0] ? ttwu_do_wakeup+0x187/0x430 [ 719.165137][ C0] dump_stack+0x15/0x17 [ 719.169129][ C0] nmi_cpu_backtrace+0x2f7/0x300 [ 719.173908][ C0] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 719.179893][ C0] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 719.185186][ C0] ? __kasan_check_write+0x14/0x20 [ 719.190135][ C0] ? _raw_spin_lock+0x1b0/0x1b0 [ 719.194827][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 719.200722][ C0] nmi_trigger_cpumask_backtrace+0x15d/0x270 [ 719.206537][ C0] ? arch_trigger_cpumask_backtrace+0x20/0x20 [ 719.212531][ C0] arch_trigger_cpumask_backtrace+0x10/0x20 [ 719.218261][ C0] rcu_dump_cpu_stacks+0x1d8/0x330 [ 719.223209][ C0] print_cpu_stall+0x315/0x5f0 [ 719.227810][ C0] rcu_sched_clock_irq+0x989/0x12f0 [ 719.232841][ C0] ? rcu_boost_kthread_setaffinity+0x340/0x340 [ 719.238830][ C0] ? hrtimer_run_queues+0x15f/0x440 [ 719.243865][ C0] update_process_times+0x198/0x200 [ 719.248898][ C0] tick_sched_timer+0x188/0x240 [ 719.253582][ C0] ? tick_setup_sched_timer+0x480/0x480 [ 719.258967][ C0] __hrtimer_run_queues+0x41a/0xad0 [ 719.264004][ C0] ? hrtimer_interrupt+0xaa0/0xaa0 [ 719.268949][ C0] ? clockevents_program_event+0x22f/0x300 [ 719.274683][ C0] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 719.280589][ C0] hrtimer_interrupt+0x40c/0xaa0 [ 719.285365][ C0] __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 719.291125][ C0] sysvec_apic_timer_interrupt+0x95/0xc0 [ 719.296557][ C0] [ 719.299335][ C0] [ 719.302115][ C0] asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 719.307927][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 719.312701][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 2b 02 13 04 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 719.332140][ C0] RSP: 0018:ffffc90000bdf2a0 EFLAGS: 00000246 [ 719.338046][ C0] RAX: 0000000000000001 RBX: 1ffff9200017be58 RCX: 1ffffffff0d5aa9c [ 719.345854][ C0] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7038ad4 [ 719.353841][ C0] RBP: ffffc90000bdf350 R08: dffffc0000000000 R09: ffffed103ee0715b [ 719.361650][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 719.369462][ C0] R13: ffff8881f7038ad4 R14: 0000000000000001 R15: 1ffff9200017be5c [ 719.377309][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 719.383262][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 719.388214][ C0] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 719.394115][ C0] ? get_page_from_freelist+0x3550/0x35d0 [ 719.399673][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 719.405920][ C0] ? 0xffffffffa0026940 [ 719.409923][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 719.414682][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 719.419717][ C0] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 719.425014][ C0] sock_hash_delete_elem+0xb1/0x2f0 [ 719.430049][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0x6c0 [ 719.435425][ C0] bpf_trace_run4+0x13f/0x270 [ 719.439939][ C0] ? bpf_trace_run3+0x250/0x250 [ 719.444628][ C0] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 719.449922][ C0] __alloc_pages+0x3cb/0x8f0 [ 719.454349][ C0] ? prep_new_page+0x110/0x110 [ 719.458958][ C0] kmalloc_order+0x4a/0x160 [ 719.463288][ C0] kmalloc_order_trace+0x1a/0xb0 [ 719.468062][ C0] ? tun_get_user+0x13b3/0x3aa0 [ 719.472748][ C0] __kmalloc_track_caller+0x19b/0x260 [ 719.477960][ C0] ? tun_get_user+0x13b3/0x3aa0 [ 719.482728][ C0] pskb_expand_head+0x113/0x1240 [ 719.487508][ C0] ? __napi_alloc_skb+0x174/0x2e0 [ 719.492376][ C0] tun_get_user+0x13b3/0x3aa0 [ 719.496880][ C0] ? __jump_label_update+0x36a/0x380 [ 719.502101][ C0] ? mutex_unlock+0xb2/0x260 [ 719.506509][ C0] ? cpus_read_unlock+0x68/0xa0 [ 719.511197][ C0] ? tun_do_read+0x1ef0/0x1ef0 [ 719.515797][ C0] ? tracepoint_add_func+0x77e/0x940 [ 719.520918][ C0] ? alloc_file_pseudo+0x280/0x2f0 [ 719.525953][ C0] ? __slab_free+0x130/0x290 [ 719.530378][ C0] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 719.535245][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 719.540275][ C0] ? preempt_count_add+0x92/0x1a0 [ 719.545132][ C0] ? avc_policy_seqno+0x1b/0x70 [ 719.549892][ C0] ? selinux_file_permission+0x2c4/0x570 [ 719.555291][ C0] tun_chr_write_iter+0x1e1/0x2e0 [ 719.560162][ C0] vfs_write+0xd5d/0x1110 [ 719.564316][ C0] ? map_freeze+0x370/0x370 [ 719.568656][ C0] ? file_end_write+0x1c0/0x1c0 [ 719.573346][ C0] ? __fdget_pos+0x209/0x3a0 [ 719.577767][ C0] ? ksys_write+0x77/0x2c0 [ 719.582031][ C0] ksys_write+0x199/0x2c0 [ 719.586189][ C0] ? __ia32_sys_read+0x90/0x90 [ 719.590787][ C0] ? __kasan_check_read+0x11/0x20 [ 719.595650][ C0] __x64_sys_write+0x7b/0x90 [ 719.600104][ C0] do_syscall_64+0x3d/0xb0 [ 719.604326][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 719.610053][ C0] RIP: 0033:0x7f43aff9a299 [ 719.614400][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 719.633835][ C0] RSP: 002b:00007f43aec1a048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 719.642088][ C0] RAX: ffffffffffffffda RBX: 00007f43b0128f80 RCX: 00007f43aff9a299 [ 719.649891][ C0] RDX: 000000000000fdef RSI: 0000000020000380 RDI: 0000000000000006 [ 719.657706][ C0] RBP: 00007f43b00078e6 R08: 0000000000000000 R09: 0000000000000000 [ 719.665605][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 719.673415][ C0] R13: 000000000000000b R14: 00007f43b0128f80 R15: 00007ffea0106368 [ 719.681231][ C0] [ 719.684093][ C0] Sending NMI from CPU 0 to CPUs 1: [ 719.689156][ C1] NMI backtrace for cpu 1 [ 719.689166][ C1] CPU: 1 PID: 15634 Comm: syz-executor Not tainted 5.15.151-syzkaller-00127-g4edafe6c0231 #0 [ 719.689184][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 719.689195][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 719.689216][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 2b 02 13 04 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 719.689231][ C1] RSP: 0018:ffffc90000ba5aa0 EFLAGS: 00000246 [ 719.689246][ C1] RAX: 0000000000000003 RBX: 1ffff92000174b58 RCX: ffffffff8155068f [ 719.689258][ C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff88810a272018 [ 719.689270][ C1] RBP: ffffc90000ba5b50 R08: dffffc0000000000 R09: ffffed102144e404 [ 719.689283][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 719.689295][ C1] R13: ffff88810a272018 R14: 0000000000000003 R15: 1ffff92000174b5c [ 719.689307][ C1] FS: 000055555565b500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 719.689323][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 719.689340][ C1] CR2: 00005555556764a8 CR3: 0000000133907000 CR4: 00000000003506a0 [ 719.689355][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 719.689364][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 719.689375][ C1] Call Trace: [ 719.689380][ C1] [ 719.689387][ C1] ? show_regs+0x58/0x60 [ 719.689404][ C1] ? nmi_cpu_backtrace+0x29f/0x300 [ 719.689424][ C1] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 719.689445][ C1] ? kvm_wait+0x147/0x180 [ 719.689460][ C1] ? kvm_wait+0x147/0x180 [ 719.689475][ C1] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 719.689493][ C1] ? nmi_handle+0xa8/0x280 [ 719.689510][ C1] ? kvm_wait+0x147/0x180 [ 719.689525][ C1] ? default_do_nmi+0x69/0x160 [ 719.689541][ C1] ? exc_nmi+0xaf/0x120 [ 719.689554][ C1] ? end_repeat_nmi+0x16/0x31 [ 719.689571][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 719.689592][ C1] ? kvm_wait+0x147/0x180 [ 719.689606][ C1] ? kvm_wait+0x147/0x180 [ 719.689622][ C1] ? kvm_wait+0x147/0x180 [ 719.689636][ C1] [ 719.689641][ C1] [ 719.689645][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 719.689666][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 719.689683][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 719.689703][ C1] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 719.689724][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 719.689747][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 719.689764][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 719.689782][ C1] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 719.689803][ C1] sock_hash_delete_elem+0xb1/0x2f0 [ 719.689823][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0x6c0 [ 719.689837][ C1] bpf_trace_run4+0x13f/0x270 [ 719.689856][ C1] ? bpf_trace_run3+0x250/0x250 [ 719.689876][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 719.689895][ C1] __alloc_pages+0x3cb/0x8f0 [ 719.689912][ C1] ? prep_new_page+0x110/0x110 [ 719.689930][ C1] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 719.689947][ C1] ? stack_trace_save+0x113/0x1c0 [ 719.689966][ C1] __stack_depot_save+0x38d/0x470 [ 719.689983][ C1] stack_depot_save+0xe/0x10 [ 719.689997][ C1] save_stack+0x104/0x1e0 [ 719.690014][ C1] ? __reset_page_owner+0x190/0x190 [ 719.690029][ C1] ? post_alloc_hook+0x1a3/0x1b0 [ 719.690045][ C1] ? prep_new_page+0x1b/0x110 [ 719.690061][ C1] ? get_page_from_freelist+0x3550/0x35d0 [ 719.690079][ C1] ? __alloc_pages+0x27e/0x8f0 [ 719.690096][ C1] ? __stack_depot_save+0x38d/0x470 [ 719.690110][ C1] ? kasan_set_track+0x5d/0x70 [ 719.690125][ C1] ? kasan_set_free_info+0x23/0x40 [ 719.690141][ C1] ? ____kasan_slab_free+0x126/0x160 [ 719.690157][ C1] ? __kasan_slab_free+0x11/0x20 [ 719.690172][ C1] ? slab_free_freelist_hook+0xbd/0x190 [ 719.690190][ C1] ? kfree+0xc8/0x220 [ 719.690206][ C1] ? sock_map_unref+0x352/0x4d0 [ 719.690223][ C1] ? sock_hash_delete_elem+0x274/0x2f0 [ 719.690241][ C1] ? bpf_prog_2c29ac5cdc6b1842+0x3a/0x6c0 [ 719.690254][ C1] ? bpf_trace_run4+0x13f/0x270 [ 719.690271][ C1] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 719.690286][ C1] ? __kasan_check_write+0x14/0x20 [ 719.690304][ C1] ? __kasan_check_write+0x14/0x20 [ 719.690321][ C1] __set_page_owner+0x28/0x2e0 [ 719.690343][ C1] ? kernel_init_free_pages+0xda/0xf0 [ 719.690361][ C1] post_alloc_hook+0x1a3/0x1b0 [ 719.690379][ C1] prep_new_page+0x1b/0x110 [ 719.690396][ C1] get_page_from_freelist+0x3550/0x35d0 [ 719.690423][ C1] ? lruvec_init+0x150/0x150 [ 719.690443][ C1] ? __alloc_pages+0x8f0/0x8f0 [ 719.690461][ C1] ? __alloc_pages_bulk+0xe40/0xe40 [ 719.690479][ C1] ? stack_trace_save+0x1c0/0x1c0 [ 719.690498][ C1] __alloc_pages+0x27e/0x8f0 [ 719.690516][ C1] ? prep_new_page+0x110/0x110 [ 719.690534][ C1] ? stack_trace_save+0x113/0x1c0 [ 719.690551][ C1] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 719.690571][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 719.690588][ C1] __stack_depot_save+0x38d/0x470 [ 719.690604][ C1] ? kfree+0xc8/0x220 [ 719.690621][ C1] kasan_set_track+0x5d/0x70 [ 719.690635][ C1] ? kasan_set_track+0x4b/0x70 [ 719.690650][ C1] ? kasan_set_free_info+0x23/0x40 [ 719.690666][ C1] ? ____kasan_slab_free+0x126/0x160 [ 719.690682][ C1] ? __kasan_slab_free+0x11/0x20 [ 719.690697][ C1] ? slab_free_freelist_hook+0xbd/0x190 [ 719.690715][ C1] ? kfree+0xc8/0x220 [ 719.690731][ C1] ? sock_map_unref+0x352/0x4d0 [ 719.690748][ C1] ? sock_hash_delete_elem+0x274/0x2f0 [ 719.690766][ C1] ? bpf_prog_2c29ac5cdc6b1842+0x3a/0x6c0 [ 719.690779][ C1] ? bpf_trace_run4+0x13f/0x270 [ 719.690814][ C1] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 719.690830][ C1] ? __alloc_pages+0x3cb/0x8f0 [ 719.690847][ C1] ? __vmalloc_node_range+0x482/0x8d0 [ 719.690864][ C1] ? vzalloc+0x78/0x90 [ 719.690878][ C1] ? alloc_counters+0x69/0x510 [ 719.690895][ C1] ? do_ip6t_get_ctl+0xea7/0x1890 [ 719.690912][ C1] ? nf_getsockopt+0x26c/0x290 [ 719.690929][ C1] ? ipv6_getsockopt+0x1de6/0x3050 [ 719.690946][ C1] ? tcp_getsockopt+0x257/0x7150 [ 719.690964][ C1] ? sock_common_getsockopt+0x99/0xb0 [ 719.690980][ C1] ? __sys_getsockopt+0x290/0x4f0 [ 719.690998][ C1] ? __x64_sys_getsockopt+0xbf/0xd0 [ 719.691015][ C1] ? do_syscall_64+0x3d/0xb0 [ 719.691032][ C1] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 719.691059][ C1] ? post_alloc_hook+0x1a3/0x1b0 [ 719.691077][ C1] kasan_set_free_info+0x23/0x40 [ 719.691094][ C1] ____kasan_slab_free+0x126/0x160 [ 719.691112][ C1] __kasan_slab_free+0x11/0x20 [ 719.691128][ C1] slab_free_freelist_hook+0xbd/0x190 [ 719.691148][ C1] ? sock_map_unref+0x352/0x4d0 [ 719.691167][ C1] kfree+0xc8/0x220 [ 719.691185][ C1] sock_map_unref+0x352/0x4d0 [ 719.691205][ C1] sock_hash_delete_elem+0x274/0x2f0 [ 719.691226][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0x6c0 [ 719.691239][ C1] bpf_trace_run4+0x13f/0x270 [ 719.691258][ C1] ? bpf_trace_run3+0x250/0x250 [ 719.691280][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 719.691298][ C1] __alloc_pages+0x3cb/0x8f0 [ 719.691316][ C1] ? prep_new_page+0x110/0x110 [ 719.691342][ C1] ? __kasan_kmalloc+0x9/0x10 [ 719.691358][ C1] ? __kmalloc+0x13a/0x270 [ 719.691375][ C1] ? __vmalloc_node_range+0x2d6/0x8d0 [ 719.691393][ C1] __vmalloc_node_range+0x482/0x8d0 [ 719.691414][ C1] ? alloc_counters+0x69/0x510 [ 719.691443][ C1] vzalloc+0x78/0x90 [ 719.691457][ C1] ? alloc_counters+0x69/0x510 [ 719.691474][ C1] alloc_counters+0x69/0x510 [ 719.691492][ C1] ? xt_find_table_lock+0x373/0x3f0 [ 719.691510][ C1] do_ip6t_get_ctl+0xea7/0x1890 [ 719.691528][ C1] ? xt_table_unlock+0x49/0x70 [ 719.691544][ C1] ? do_ip6t_set_ctl+0x3f50/0x3f50 [ 719.691563][ C1] ? do_ipt_set_ctl+0x3e80/0x3e80 [ 719.691591][ C1] ? __kasan_check_write+0x14/0x20 [ 719.691608][ C1] ? mutex_unlock+0xb2/0x260 [ 719.691627][ C1] ? __mutex_lock_slowpath+0x10/0x10 [ 719.691643][ C1] ? sysvec_call_function_single+0x52/0xb0 [ 719.691659][ C1] ? asm_sysvec_call_function_single+0x1b/0x20 [ 719.691683][ C1] nf_getsockopt+0x26c/0x290 [ 719.691701][ C1] ipv6_getsockopt+0x1de6/0x3050 [ 719.691718][ C1] ? nf_getsockopt+0x286/0x290 [ 719.691735][ C1] ? ip_getsockopt+0x1473/0x1da0 [ 719.691750][ C1] ? ipv6_setsockopt+0x4240/0x4240 [ 719.691777][ C1] ? 0xffffffffa0026940 [ 719.691788][ C1] ? is_bpf_text_address+0x172/0x190 [ 719.691806][ C1] ? stack_trace_save+0x1c0/0x1c0 [ 719.691824][ C1] tcp_getsockopt+0x257/0x7150 [ 719.691847][ C1] ? 0xffffffffa0026940 [ 719.691857][ C1] ? is_bpf_text_address+0x172/0x190 [ 719.691875][ C1] ? tcp_bpf_bypass_getsockopt+0x40/0x40 [ 719.691893][ C1] ? __kernel_text_address+0x9b/0x110 [ 719.691910][ C1] ? unwind_get_return_address+0x4d/0x90 [ 719.691928][ C1] ? arch_stack_walk+0xf3/0x140 [ 719.691949][ C1] ? stack_trace_save+0x113/0x1c0 [ 719.691966][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 719.691984][ C1] ? __stack_depot_save+0x34/0x470 [ 719.692000][ C1] ? __kasan_slab_alloc+0xc3/0xe0 [ 719.692016][ C1] ? __kasan_slab_alloc+0xb1/0xe0 [ 719.692031][ C1] ? slab_post_alloc_hook+0x53/0x2c0 [ 719.692048][ C1] ? kmem_cache_alloc+0xf5/0x200 [ 719.692065][ C1] ? security_file_alloc+0x29/0x120 [ 719.692083][ C1] ? __alloc_file+0xb2/0x2a0 [ 719.692099][ C1] ? alloc_empty_file+0x95/0x180 [ 719.692115][ C1] ? alloc_file+0x5a/0x4e0 [ 719.692130][ C1] ? alloc_file_pseudo+0x259/0x2f0 [ 719.692146][ C1] ? sock_alloc_file+0xbb/0x260 [ 719.692161][ C1] ? __sys_socket+0x194/0x370 [ 719.692176][ C1] ? __x64_sys_socket+0x7a/0x90 [ 719.692192][ C1] ? do_syscall_64+0x3d/0xb0 [ 719.692208][ C1] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 719.692232][ C1] ? avc_has_perm_noaudit+0x348/0x430 [ 719.692250][ C1] ? memcpy+0x56/0x70 [ 719.692266][ C1] ? avc_has_perm_noaudit+0x2dd/0x430 [ 719.692284][ C1] ? avc_denied+0x1b0/0x1b0 [ 719.692302][ C1] ? security_file_alloc+0x29/0x120 [ 719.692322][ C1] ? avc_has_perm+0x16f/0x260 [ 719.692343][ C1] ? avc_has_perm_noaudit+0x430/0x430 [ 719.692361][ C1] ? memcpy+0x56/0x70 [ 719.692376][ C1] ? errseq_sample+0x44/0x70 [ 719.692393][ C1] ? selinux_socket_getsockopt+0x243/0x340 [ 719.692410][ C1] ? selinux_socket_getpeername+0x340/0x340 [ 719.692428][ C1] ? alloc_empty_file_noaccount+0x80/0x80 [ 719.692449][ C1] sock_common_getsockopt+0x99/0xb0 [ 719.692466][ C1] ? sock_recv_errqueue+0x4b0/0x4b0 [ 719.692483][ C1] __sys_getsockopt+0x290/0x4f0 [ 719.692502][ C1] __x64_sys_getsockopt+0xbf/0xd0 [ 719.692519][ C1] do_syscall_64+0x3d/0xb0 [ 719.692536][ C1] ? sysvec_call_function_single+0x52/0xb0 [ 719.692569][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 719.692589][ C1] RIP: 0033:0x7fc733f74eda [ 719.692604][ C1] Code: ff c3 66 0f 1f 44 00 00 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb b8 0f 1f 44 00 00 49 89 ca b8 37 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 a8 ff ff ff f7 [ 719.692618][ C1] RSP: 002b:00007ffe50faa518 EFLAGS: 00000212 ORIG_RAX: 0000000000000037 [ 719.692636][ C1] RAX: ffffffffffffffda RBX: 00007ffe50faa5a0 RCX: 00007fc733f74eda [ 719.692649][ C1] RDX: 0000000000000041 RSI: 0000000000000029 RDI: 0000000000000003 [ 719.692660][ C1] RBP: 0000000000000003 R08: 00007ffe50faa53c R09: 0079746972756365 [ 719.692672][ C1] R10: 00007ffe50faa5a0 R11: 0000000000000212 R12: 00007fc7340ccc80 [ 719.692684][ C1] R13: 00007ffe50faa53c R14: 0000000000000000 R15: 00007fc7340cee40 [ 719.692700][ C1] [ 859.028981][ C1] watchdog: BUG: soft lockup - CPU#1 stuck for 226s! [syz-executor:15634] [ 859.037399][ C1] Modules linked in: [ 859.041133][ C1] CPU: 1 PID: 15634 Comm: syz-executor Not tainted 5.15.151-syzkaller-00127-g4edafe6c0231 #0 [ 859.051137][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 859.061007][ C1] RIP: 0010:kvm_wait+0x147/0x180 [ 859.065780][ C1] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 2b 02 13 04 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 859.085831][ C1] RSP: 0018:ffffc90000ba5aa0 EFLAGS: 00000246 [ 859.091732][ C1] RAX: 0000000000000003 RBX: 1ffff92000174b58 RCX: ffffffff8155068f [ 859.099738][ C1] RDX: dffffc0000000000 RSI: 0000000000000003 RDI: ffff88810a272018 [ 859.107545][ C1] RBP: ffffc90000ba5b50 R08: dffffc0000000000 R09: ffffed102144e404 [ 859.115349][ C1] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 859.123397][ C1] R13: ffff88810a272018 R14: 0000000000000003 R15: 1ffff92000174b5c [ 859.131203][ C1] FS: 000055555565b500(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 859.139969][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 859.146479][ C1] CR2: 00005555556764a8 CR3: 0000000133907000 CR4: 00000000003506a0 [ 859.154290][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 859.162101][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 859.170033][ C1] Call Trace: [ 859.173148][ C1] [ 859.175841][ C1] ? show_regs+0x58/0x60 [ 859.179916][ C1] ? watchdog_timer_fn+0x4b1/0x5f0 [ 859.184863][ C1] ? proc_watchdog_cpumask+0xd0/0xd0 [ 859.189987][ C1] ? __hrtimer_run_queues+0x41a/0xad0 [ 859.195193][ C1] ? hrtimer_interrupt+0xaa0/0xaa0 [ 859.200147][ C1] ? clockevents_program_event+0x22f/0x300 [ 859.205873][ C1] ? ktime_get_update_offsets_now+0x2ba/0x2d0 [ 859.211771][ C1] ? hrtimer_interrupt+0x40c/0xaa0 [ 859.216807][ C1] ? __sysvec_apic_timer_interrupt+0xfd/0x3c0 [ 859.222705][ C1] ? sysvec_apic_timer_interrupt+0x95/0xc0 [ 859.228431][ C1] [ 859.231210][ C1] [ 859.233986][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 859.239984][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 859.246170][ C1] ? kvm_wait+0x147/0x180 [ 859.250450][ C1] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 859.256440][ C1] ? kvm_arch_para_hints+0x30/0x30 [ 859.261390][ C1] ? __pv_queued_spin_lock_slowpath+0x65f/0xc40 [ 859.267470][ C1] __pv_queued_spin_lock_slowpath+0x6bc/0xc40 [ 859.273369][ C1] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 859.279615][ C1] _raw_spin_lock_bh+0x139/0x1b0 [ 859.284393][ C1] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 859.289424][ C1] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 859.294716][ C1] sock_hash_delete_elem+0xb1/0x2f0 [ 859.299750][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0x6c0 [ 859.305305][ C1] bpf_trace_run4+0x13f/0x270 [ 859.309906][ C1] ? bpf_trace_run3+0x250/0x250 [ 859.314595][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 859.319976][ C1] __alloc_pages+0x3cb/0x8f0 [ 859.324402][ C1] ? prep_new_page+0x110/0x110 [ 859.329087][ C1] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 859.334556][ C1] ? stack_trace_save+0x113/0x1c0 [ 859.339416][ C1] __stack_depot_save+0x38d/0x470 [ 859.344364][ C1] stack_depot_save+0xe/0x10 [ 859.348788][ C1] save_stack+0x104/0x1e0 [ 859.352954][ C1] ? __reset_page_owner+0x190/0x190 [ 859.357988][ C1] ? post_alloc_hook+0x1a3/0x1b0 [ 859.362772][ C1] ? prep_new_page+0x1b/0x110 [ 859.367361][ C1] ? get_page_from_freelist+0x3550/0x35d0 [ 859.372919][ C1] ? __alloc_pages+0x27e/0x8f0 [ 859.377516][ C1] ? __stack_depot_save+0x38d/0x470 [ 859.382551][ C1] ? kasan_set_track+0x5d/0x70 [ 859.387152][ C1] ? kasan_set_free_info+0x23/0x40 [ 859.392098][ C1] ? ____kasan_slab_free+0x126/0x160 [ 859.397219][ C1] ? __kasan_slab_free+0x11/0x20 [ 859.401990][ C1] ? slab_free_freelist_hook+0xbd/0x190 [ 859.407373][ C1] ? kfree+0xc8/0x220 [ 859.411191][ C1] ? sock_map_unref+0x352/0x4d0 [ 859.415880][ C1] ? sock_hash_delete_elem+0x274/0x2f0 [ 859.421174][ C1] ? bpf_prog_2c29ac5cdc6b1842+0x3a/0x6c0 [ 859.426731][ C1] ? bpf_trace_run4+0x13f/0x270 [ 859.431416][ C1] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 859.436883][ C1] ? __kasan_check_write+0x14/0x20 [ 859.441831][ C1] ? __kasan_check_write+0x14/0x20 [ 859.446780][ C1] __set_page_owner+0x28/0x2e0 [ 859.451377][ C1] ? kernel_init_free_pages+0xda/0xf0 [ 859.456585][ C1] post_alloc_hook+0x1a3/0x1b0 [ 859.461188][ C1] prep_new_page+0x1b/0x110 [ 859.465527][ C1] get_page_from_freelist+0x3550/0x35d0 [ 859.470915][ C1] ? lruvec_init+0x150/0x150 [ 859.475423][ C1] ? __alloc_pages+0x8f0/0x8f0 [ 859.480037][ C1] ? __alloc_pages_bulk+0xe40/0xe40 [ 859.485056][ C1] ? stack_trace_save+0x1c0/0x1c0 [ 859.489917][ C1] __alloc_pages+0x27e/0x8f0 [ 859.494353][ C1] ? prep_new_page+0x110/0x110 [ 859.499124][ C1] ? stack_trace_save+0x113/0x1c0 [ 859.504106][ C1] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 859.510018][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 859.515040][ C1] __stack_depot_save+0x38d/0x470 [ 859.519896][ C1] ? kfree+0xc8/0x220 [ 859.523713][ C1] kasan_set_track+0x5d/0x70 [ 859.528140][ C1] ? kasan_set_track+0x4b/0x70 [ 859.532736][ C1] ? kasan_set_free_info+0x23/0x40 [ 859.537687][ C1] ? ____kasan_slab_free+0x126/0x160 [ 859.542806][ C1] ? __kasan_slab_free+0x11/0x20 [ 859.547579][ C1] ? slab_free_freelist_hook+0xbd/0x190 [ 859.552960][ C1] ? kfree+0xc8/0x220 [ 859.556782][ C1] ? sock_map_unref+0x352/0x4d0 [ 859.561465][ C1] ? sock_hash_delete_elem+0x274/0x2f0 [ 859.566764][ C1] ? bpf_prog_2c29ac5cdc6b1842+0x3a/0x6c0 [ 859.572314][ C1] ? bpf_trace_run4+0x13f/0x270 [ 859.577002][ C1] ? __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 859.582470][ C1] ? __alloc_pages+0x3cb/0x8f0 [ 859.587071][ C1] ? __vmalloc_node_range+0x482/0x8d0 [ 859.592278][ C1] ? vzalloc+0x78/0x90 [ 859.596184][ C1] ? alloc_counters+0x69/0x510 [ 859.600788][ C1] ? do_ip6t_get_ctl+0xea7/0x1890 [ 859.605645][ C1] ? nf_getsockopt+0x26c/0x290 [ 859.610245][ C1] ? ipv6_getsockopt+0x1de6/0x3050 [ 859.615190][ C1] ? tcp_getsockopt+0x257/0x7150 [ 859.619967][ C1] ? sock_common_getsockopt+0x99/0xb0 [ 859.625171][ C1] ? __sys_getsockopt+0x290/0x4f0 [ 859.630118][ C1] ? __x64_sys_getsockopt+0xbf/0xd0 [ 859.635154][ C1] ? do_syscall_64+0x3d/0xb0 [ 859.639580][ C1] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 859.645489][ C1] ? post_alloc_hook+0x1a3/0x1b0 [ 859.650256][ C1] kasan_set_free_info+0x23/0x40 [ 859.655041][ C1] ____kasan_slab_free+0x126/0x160 [ 859.660074][ C1] __kasan_slab_free+0x11/0x20 [ 859.664673][ C1] slab_free_freelist_hook+0xbd/0x190 [ 859.669880][ C1] ? sock_map_unref+0x352/0x4d0 [ 859.674567][ C1] kfree+0xc8/0x220 [ 859.678215][ C1] sock_map_unref+0x352/0x4d0 [ 859.682728][ C1] sock_hash_delete_elem+0x274/0x2f0 [ 859.687848][ C1] bpf_prog_2c29ac5cdc6b1842+0x3a/0x6c0 [ 859.693228][ C1] bpf_trace_run4+0x13f/0x270 [ 859.697759][ C1] ? bpf_trace_run3+0x250/0x250 [ 859.702431][ C1] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 859.707724][ C1] __alloc_pages+0x3cb/0x8f0 [ 859.712150][ C1] ? prep_new_page+0x110/0x110 [ 859.716754][ C1] ? __kasan_kmalloc+0x9/0x10 [ 859.721264][ C1] ? __kmalloc+0x13a/0x270 [ 859.725517][ C1] ? __vmalloc_node_range+0x2d6/0x8d0 [ 859.730746][ C1] __vmalloc_node_range+0x482/0x8d0 [ 859.735848][ C1] ? alloc_counters+0x69/0x510 [ 859.740532][ C1] vzalloc+0x78/0x90 [ 859.744264][ C1] ? alloc_counters+0x69/0x510 [ 859.748864][ C1] alloc_counters+0x69/0x510 [ 859.753291][ C1] ? xt_find_table_lock+0x373/0x3f0 [ 859.758327][ C1] do_ip6t_get_ctl+0xea7/0x1890 [ 859.763035][ C1] ? xt_table_unlock+0x49/0x70 [ 859.767611][ C1] ? do_ip6t_set_ctl+0x3f50/0x3f50 [ 859.772558][ C1] ? do_ipt_set_ctl+0x3e80/0x3e80 [ 859.777424][ C1] ? __kasan_check_write+0x14/0x20 [ 859.782368][ C1] ? mutex_unlock+0xb2/0x260 [ 859.786792][ C1] ? __mutex_lock_slowpath+0x10/0x10 [ 859.791914][ C1] ? sysvec_call_function_single+0x52/0xb0 [ 859.797555][ C1] ? asm_sysvec_call_function_single+0x1b/0x20 [ 859.803549][ C1] nf_getsockopt+0x26c/0x290 [ 859.808055][ C1] ipv6_getsockopt+0x1de6/0x3050 [ 859.812831][ C1] ? nf_getsockopt+0x286/0x290 [ 859.817430][ C1] ? ip_getsockopt+0x1473/0x1da0 [ 859.822376][ C1] ? ipv6_setsockopt+0x4240/0x4240 [ 859.827333][ C1] ? 0xffffffffa0026940 [ 859.831319][ C1] ? is_bpf_text_address+0x172/0x190 [ 859.836557][ C1] ? stack_trace_save+0x1c0/0x1c0 [ 859.841419][ C1] tcp_getsockopt+0x257/0x7150 [ 859.846023][ C1] ? 0xffffffffa0026940 [ 859.850011][ C1] ? is_bpf_text_address+0x172/0x190 [ 859.855131][ C1] ? tcp_bpf_bypass_getsockopt+0x40/0x40 [ 859.860597][ C1] ? __kernel_text_address+0x9b/0x110 [ 859.865904][ C1] ? unwind_get_return_address+0x4d/0x90 [ 859.871661][ C1] ? arch_stack_walk+0xf3/0x140 [ 859.876342][ C1] ? stack_trace_save+0x113/0x1c0 [ 859.881200][ C1] ? stack_trace_snprint+0xf0/0xf0 [ 859.886145][ C1] ? __stack_depot_save+0x34/0x470 [ 859.891108][ C1] ? __kasan_slab_alloc+0xc3/0xe0 [ 859.896037][ C1] ? __kasan_slab_alloc+0xb1/0xe0 [ 859.900898][ C1] ? slab_post_alloc_hook+0x53/0x2c0 [ 859.906015][ C1] ? kmem_cache_alloc+0xf5/0x200 [ 859.910792][ C1] ? security_file_alloc+0x29/0x120 [ 859.915824][ C1] ? __alloc_file+0xb2/0x2a0 [ 859.920483][ C1] ? alloc_empty_file+0x95/0x180 [ 859.925199][ C1] ? alloc_file+0x5a/0x4e0 [ 859.929451][ C1] ? alloc_file_pseudo+0x259/0x2f0 [ 859.934400][ C1] ? sock_alloc_file+0xbb/0x260 [ 859.939174][ C1] ? __sys_socket+0x194/0x370 [ 859.943685][ C1] ? __x64_sys_socket+0x7a/0x90 [ 859.948376][ C1] ? do_syscall_64+0x3d/0xb0 [ 859.952798][ C1] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 859.958793][ C1] ? avc_has_perm_noaudit+0x348/0x430 [ 859.963995][ C1] ? memcpy+0x56/0x70 [ 859.967818][ C1] ? avc_has_perm_noaudit+0x2dd/0x430 [ 859.973025][ C1] ? avc_denied+0x1b0/0x1b0 [ 859.977377][ C1] ? security_file_alloc+0x29/0x120 [ 859.982406][ C1] ? avc_has_perm+0x16f/0x260 [ 859.986914][ C1] ? avc_has_perm_noaudit+0x430/0x430 [ 859.992296][ C1] ? memcpy+0x56/0x70 [ 859.996127][ C1] ? errseq_sample+0x44/0x70 [ 860.000537][ C1] ? selinux_socket_getsockopt+0x243/0x340 [ 860.006178][ C1] ? selinux_socket_getpeername+0x340/0x340 [ 860.011909][ C1] ? alloc_empty_file_noaccount+0x80/0x80 [ 860.017466][ C1] sock_common_getsockopt+0x99/0xb0 [ 860.022495][ C1] ? sock_recv_errqueue+0x4b0/0x4b0 [ 860.027535][ C1] __sys_getsockopt+0x290/0x4f0 [ 860.032232][ C1] __x64_sys_getsockopt+0xbf/0xd0 [ 860.037455][ C1] do_syscall_64+0x3d/0xb0 [ 860.041708][ C1] ? sysvec_call_function_single+0x52/0xb0 [ 860.047349][ C1] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 860.053075][ C1] RIP: 0033:0x7fc733f74eda [ 860.057339][ C1] Code: ff c3 66 0f 1f 44 00 00 48 c7 c2 a8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb b8 0f 1f 44 00 00 49 89 ca b8 37 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 06 c3 0f 1f 44 00 00 48 c7 c2 a8 ff ff ff f7 [ 860.076859][ C1] RSP: 002b:00007ffe50faa518 EFLAGS: 00000212 ORIG_RAX: 0000000000000037 [ 860.085194][ C1] RAX: ffffffffffffffda RBX: 00007ffe50faa5a0 RCX: 00007fc733f74eda [ 860.092999][ C1] RDX: 0000000000000041 RSI: 0000000000000029 RDI: 0000000000000003 [ 860.100812][ C1] RBP: 0000000000000003 R08: 00007ffe50faa53c R09: 0079746972756365 [ 860.108629][ C1] R10: 00007ffe50faa5a0 R11: 0000000000000212 R12: 00007fc7340ccc80 [ 860.116434][ C1] R13: 00007ffe50faa53c R14: 0000000000000000 R15: 00007fc7340cee40 [ 860.124339][ C1] [ 860.127200][ C1] Sending NMI from CPU 1 to CPUs 0: [ 860.132252][ C0] NMI backtrace for cpu 0 [ 860.132262][ C0] CPU: 0 PID: 16794 Comm: syz.3.6401 Not tainted 5.15.151-syzkaller-00127-g4edafe6c0231 #0 [ 860.132281][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/27/2024 [ 860.132290][ C0] RIP: 0010:kvm_wait+0x147/0x180 [ 860.132312][ C0] Code: 4c 89 e8 48 c1 e8 03 42 0f b6 04 20 84 c0 44 8b 74 24 1c 75 34 41 0f b6 45 00 44 38 f0 75 10 66 90 0f 00 2d 2b 02 13 04 fb f4 24 ff ff ff fb e9 1e ff ff ff 44 89 e9 80 e1 07 38 c1 7c a3 4c [ 860.132326][ C0] RSP: 0018:ffffc90000bdf2a0 EFLAGS: 00000246 [ 860.132341][ C0] RAX: 0000000000000001 RBX: 1ffff9200017be58 RCX: 1ffffffff0d5aa9c [ 860.132354][ C0] RDX: 0000000000000001 RSI: 0000000000000001 RDI: ffff8881f7038ad4 [ 860.132365][ C0] RBP: ffffc90000bdf350 R08: dffffc0000000000 R09: ffffed103ee0715b [ 860.132378][ C0] R10: 0000000000000000 R11: dffffc0000000001 R12: dffffc0000000000 [ 860.132391][ C0] R13: ffff8881f7038ad4 R14: 0000000000000001 R15: 1ffff9200017be5c [ 860.132404][ C0] FS: 00007f43aec1a6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 860.132421][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 860.132434][ C0] CR2: 0000000000000000 CR3: 000000013a6fb000 CR4: 00000000003506b0 [ 860.132451][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 860.132462][ C0] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 860.132474][ C0] Call Trace: [ 860.132481][ C0] [ 860.132488][ C0] ? show_regs+0x58/0x60 [ 860.132506][ C0] ? nmi_cpu_backtrace+0x29f/0x300 [ 860.132529][ C0] ? nmi_trigger_cpumask_backtrace+0x270/0x270 [ 860.132551][ C0] ? kvm_wait+0x147/0x180 [ 860.132567][ C0] ? kvm_wait+0x147/0x180 [ 860.132584][ C0] ? nmi_cpu_backtrace_handler+0xc/0x20 [ 860.132604][ C0] ? nmi_handle+0xa8/0x280 [ 860.132622][ C0] ? kvm_wait+0x147/0x180 [ 860.132639][ C0] ? default_do_nmi+0x69/0x160 [ 860.132656][ C0] ? exc_nmi+0xaf/0x120 [ 860.132671][ C0] ? end_repeat_nmi+0x16/0x31 [ 860.132690][ C0] ? kvm_wait+0x147/0x180 [ 860.132707][ C0] ? kvm_wait+0x147/0x180 [ 860.132724][ C0] ? kvm_wait+0x147/0x180 [ 860.132740][ C0] [ 860.132745][ C0] [ 860.132751][ C0] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 860.132774][ C0] ? kvm_arch_para_hints+0x30/0x30 [ 860.132793][ C0] __pv_queued_spin_lock_slowpath+0x41b/0xc40 [ 860.132816][ C0] ? get_page_from_freelist+0x3550/0x35d0 [ 860.132838][ C0] ? __pv_queued_spin_unlock_slowpath+0x310/0x310 [ 860.132860][ C0] ? 0xffffffffa0026940 [ 860.132875][ C0] _raw_spin_lock_bh+0x139/0x1b0 [ 860.132893][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 860.132914][ C0] ? sock_hash_bucket_hash+0x31c/0x7e0 [ 860.132936][ C0] sock_hash_delete_elem+0xb1/0x2f0 [ 860.132958][ C0] bpf_prog_2c29ac5cdc6b1842+0x3a/0x6c0 [ 860.132972][ C0] bpf_trace_run4+0x13f/0x270 [ 860.132992][ C0] ? bpf_trace_run3+0x250/0x250 [ 860.133014][ C0] __bpf_trace_mm_page_alloc+0xbf/0xf0 [ 860.133033][ C0] __alloc_pages+0x3cb/0x8f0 [ 860.133052][ C0] ? prep_new_page+0x110/0x110 [ 860.133075][ C0] kmalloc_order+0x4a/0x160 [ 860.133093][ C0] kmalloc_order_trace+0x1a/0xb0 [ 860.133110][ C0] ? tun_get_user+0x13b3/0x3aa0 [ 860.133130][ C0] __kmalloc_track_caller+0x19b/0x260 [ 860.133160][ C0] ? tun_get_user+0x13b3/0x3aa0 [ 860.133179][ C0] pskb_expand_head+0x113/0x1240 [ 860.133198][ C0] ? __napi_alloc_skb+0x174/0x2e0 [ 860.133217][ C0] tun_get_user+0x13b3/0x3aa0 [ 860.133235][ C0] ? __jump_label_update+0x36a/0x380 [ 860.133256][ C0] ? mutex_unlock+0xb2/0x260 [ 860.133272][ C0] ? cpus_read_unlock+0x68/0xa0 [ 860.133289][ C0] ? tun_do_read+0x1ef0/0x1ef0 [ 860.133307][ C0] ? tracepoint_add_func+0x77e/0x940 [ 860.133325][ C0] ? alloc_file_pseudo+0x280/0x2f0 [ 860.133346][ C0] ? __slab_free+0x130/0x290 [ 860.133364][ C0] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 860.133382][ C0] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 860.133400][ C0] ? preempt_count_add+0x92/0x1a0 [ 860.133418][ C0] ? avc_policy_seqno+0x1b/0x70 [ 860.133437][ C0] ? selinux_file_permission+0x2c4/0x570 [ 860.133458][ C0] tun_chr_write_iter+0x1e1/0x2e0 [ 860.133478][ C0] vfs_write+0xd5d/0x1110 [ 860.133495][ C0] ? map_freeze+0x370/0x370 [ 860.133514][ C0] ? file_end_write+0x1c0/0x1c0 [ 860.133535][ C0] ? __fdget_pos+0x209/0x3a0 [ 860.133551][ C0] ? ksys_write+0x77/0x2c0 [ 860.133567][ C0] ksys_write+0x199/0x2c0 [ 860.133583][ C0] ? __ia32_sys_read+0x90/0x90 [ 860.133600][ C0] ? __kasan_check_read+0x11/0x20 [ 860.133620][ C0] __x64_sys_write+0x7b/0x90 [ 860.133636][ C0] do_syscall_64+0x3d/0xb0 [ 860.133655][ C0] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 860.133675][ C0] RIP: 0033:0x7f43aff9a299 [ 860.133690][ C0] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 860.133704][ C0] RSP: 002b:00007f43aec1a048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 860.133721][ C0] RAX: ffffffffffffffda RBX: 00007f43b0128f80 RCX: 00007f43aff9a299 [ 860.133734][ C0] RDX: 000000000000fdef RSI: 0000000020000380 RDI: 0000000000000006 [ 860.133746][ C0] RBP: 00007f43b00078e6 R08: 0000000000000000 R09: 0000000000000000 [ 860.133759][ C0] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 860.133770][ C0] R13: 000000000000000b R14: 00007f43b0128f80 R15: 00007ffea0106368 [ 860.133787][ C0]