last executing test programs: 12.800009589s ago: executing program 2 (id=4765): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0xd}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) recvmsg$unix(r2, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x0, 0x81}, 0x48) write$cgroup_subtree(r4, &(0x7f0000000000)=ANY=[], 0xe) 12.799188339s ago: executing program 2 (id=4767): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0xa, 0x1, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002f00)={{r0}, &(0x7f0000002e80), &(0x7f0000002ec0)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x4, &(0x7f0000000480)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x3, 0xc, &(0x7f0000000680)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffe94, 0x0, 0xffffffffffffffff, 0xfffffffffffffe7d}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0xf, 0x4, 0x0, &(0x7f0000000200)) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000500)='./file0\x00', 0x0, 0x18}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x913}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x18, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000680)=ANY=[@ANYRES8=r8, @ANYRESOCT=r8, @ANYRESHEX, @ANYRES16=r1, @ANYRES64=r1, @ANYRESDEC=r6, @ANYRESHEX=r3, @ANYRESDEC=r7, @ANYRES8=r3, @ANYRES64=r2], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x6, 0x6, 0x8d, 0x3024, r4, 0x49c01fbd, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x5, 0x7}, 0xffffffffffffff0c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_freezer_state(r9, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(r10, &(0x7f0000000040)='FROZEN\x00', 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100004b028ee7000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r11 = openat$cgroup_procs(r9, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r11, &(0x7f0000000180), 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x3}, 0x48) write$cgroup_freezer_state(r10, &(0x7f0000000080)='THAWED\x00', 0x7) 12.553920249s ago: executing program 2 (id=4770): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x8}, 0xfffffffffffffffc) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00'}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 12.243086634s ago: executing program 2 (id=4772): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000004018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c) 11.335524938s ago: executing program 2 (id=4776): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x8}, 0xfffffffffffffffc) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 11.1935543s ago: executing program 2 (id=4780): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x1, 0xa, 0x1, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002f00)={{r0}, &(0x7f0000002e80), &(0x7f0000002ec0)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x4, &(0x7f0000000480)={{r0, 0xffffffffffffffff}, &(0x7f0000000000), 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0x3, 0xc, &(0x7f0000000680)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffffffffffe94, 0x0, 0xffffffffffffffff, 0xfffffffffffffe7d}, 0x80) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syz_tun\x00', 0x400}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0xf, 0x4, 0x0, &(0x7f0000000200)) r2 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000580)=@generic={&(0x7f0000000500)='./file0\x00', 0x0, 0x18}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32=0xffffffffffffffff, @ANYBLOB="0000000000000000b7080000002000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000f"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x913}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000008500000082"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x18, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='ext4_ext_remove_space_done\x00', r5}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x5, &(0x7f0000000680)=ANY=[@ANYRES8=r8, @ANYRESOCT=r8, @ANYRESHEX, @ANYRES16=r1, @ANYRES64=r1, @ANYRESDEC=r6, @ANYRESHEX=r3, @ANYRESDEC=r7, @ANYRES8=r3, @ANYRES64=r2], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@bloom_filter={0x1e, 0x6, 0x6, 0x8d, 0x3024, r4, 0x49c01fbd, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x2, 0x5, 0x7}, 0xffffffffffffff0c) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_freezer_state(r9, &(0x7f0000000140), 0x2, 0x0) write$cgroup_freezer_state(r10, &(0x7f0000000040)='FROZEN\x00', 0x7) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100004b028ee7000000000000ea04850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) r11 = openat$cgroup_procs(r9, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r11, &(0x7f0000000180), 0x12) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x0, 0x3}, 0x48) write$cgroup_freezer_state(r10, &(0x7f0000000080)='THAWED\x00', 0x7) 4.026524392s ago: executing program 1 (id=4855): bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0xf6bb, 0x8, 0x4002, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x5}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB='+blkio +ne\x00 '], 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='tlb_flush\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x7fe2}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x15) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r8], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x3, &(0x7f0000000380)=@raw=[@exit, @map_fd={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f00000003c0)='syzkaller\x00', 0x7ff, 0x1000, &(0x7f0000001340)=""/4096, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x2, 0x2, 0x2, 0x1000}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000500)=[r2, 0xffffffffffffffff, 0xffffffffffffffff, r1, r5, r6, r3, r5, r1], &(0x7f0000000540)=[{0x3, 0x2, 0xf, 0x18}, {0x0, 0x2, 0x3, 0xb}], 0x10, 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f00000002c0)='pwc_handler_enter\x00', r10}, 0x10) close(r9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00'}, 0x10) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r11}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r11}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 3.098356568s ago: executing program 1 (id=4861): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x0, 0x5, 0x8, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x5, 0xc}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f0000000500)="059e949c5aa72b3c50778f9a5a5322a35037bcedfdda6d6ebcd483e42cad229a6354afdf8006d87ff9acea86bff31b3ee3799cd1771952438f78773cadb5ca306e7950d6ed473d36aee5992b8ab245318102e0e3771a0acdd8c1504dc0b588835b9ad91ee364b9929decefda35af84d6b7f59e83ac23f4ff4cc6651e960f907b39bd2d3fc06f34dfcb19d0d721f7ba27be0d23706fc0cec2e1e369f630f425f6144fa71707639adb9256c0f8f87dbbaf3dc6b60ac53c8c4d90e003d1ed66e0ddcdd0b43a5e2bfb60fd70344aa35a28df8208277f3806a5bdafa7f960387200a0", &(0x7f0000000200)=""/20, 0x4}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x8, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000200)={r2, &(0x7f0000000080), &(0x7f0000000000)=""/10, 0x3}, 0x20) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x1ff000, 0x81, 0x7f, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="7a0a00ff0000000071105e00000b000095000000000001bee36b9044069cd66a542ddb070000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000580)={r4, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x72d57cb5528fe5f3) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x20001439) close(r5) close(0xffffffffffffffff) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) 3.002693886s ago: executing program 0 (id=4863): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x8}, 0xfffffffffffffffc) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r2}, 0x10) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r4}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 2.837796369s ago: executing program 1 (id=4865): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x8, 0x9, 0x400, 0xffffffffffffffff, 0xfffffffc}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x2, 0x17, &(0x7f0000000880)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x76}}, {{0x6, 0x0, 0x2, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0}, 0x90) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) 2.799154052s ago: executing program 0 (id=4868): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000005c0), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0xf6bb, 0x8, 0x4002, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x5}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB='+blkio +ne\x00 '], 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='tlb_flush\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x7fe2}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r8) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x15) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r9], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x3, &(0x7f0000000380)=@raw=[@exit, @map_fd={0x18, 0xa, 0x1, 0x0, r6}], &(0x7f00000003c0)='syzkaller\x00', 0x7ff, 0x1000, &(0x7f0000001340)=""/4096, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x2, 0x2, 0x2, 0x1000}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000500)=[r3, r0, r0, r2, r6, r7, r4, r6, r2], &(0x7f0000000540)=[{0x3, 0x2, 0xf, 0x18}, {0x0, 0x2, 0x3, 0xb}], 0x10, 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f00000002c0)='pwc_handler_enter\x00', r11}, 0x10) close(r10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00'}, 0x10) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r12}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r12}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) 2.057827512s ago: executing program 3 (id=4870): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x1004000, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.96533782s ago: executing program 3 (id=4871): bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0xf6bb, 0x8, 0x4002, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x5}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB='+blkio +ne\x00 '], 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='tlb_flush\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x7fe2}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x15) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r8], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x3, &(0x7f0000000380)=@raw=[@exit, @map_fd={0x18, 0xa, 0x1, 0x0, r5}], &(0x7f00000003c0)='syzkaller\x00', 0x7ff, 0x1000, &(0x7f0000001340)=""/4096, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x2, 0x2, 0x2, 0x1000}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000500)=[r2, 0xffffffffffffffff, 0xffffffffffffffff, r1, r5, r6, r3, r5, r1], &(0x7f0000000540)=[{0x3, 0x2, 0xf, 0x18}, {0x0, 0x2, 0x3, 0xb}], 0x10, 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f00000002c0)='pwc_handler_enter\x00', r10}, 0x10) close(r9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00'}, 0x10) r11 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r11}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r11}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.936682482s ago: executing program 1 (id=4872): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x8}, 0xfffffffffffffffc) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) 1.931697242s ago: executing program 4 (id=4873): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x6, 0x8, 0x8}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000200)=@generic={&(0x7f0000000180)='./cgroup\x00', r0, 0xffffffff}, 0x18) 1.916258004s ago: executing program 4 (id=4874): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000005c0), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0x0, 0x8, 0x4002, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x5}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB='+blkio +ne\x00 '], 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='tlb_flush\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x7fe2}, 0x48) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYRES32], 0x18}, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x3, &(0x7f0000000380)=@raw=[@exit, @map_fd={0x18, 0xa, 0x1, 0x0, r2}], &(0x7f00000003c0)='syzkaller\x00', 0x7ff, 0x1000, &(0x7f0000001340)=""/4096, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x2, 0x2, 0x2, 0x1000}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000500)=[0xffffffffffffffff, r0, r0, r1, r2, r3, 0xffffffffffffffff, r2, r1], &(0x7f0000000540)=[{0x3, 0x2, 0xf, 0x18}, {0x0, 0x2, 0x3, 0xb}], 0x10, 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f00000002c0)='pwc_handler_enter\x00', r4}, 0x10) close(0xffffffffffffffff) close(0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00'}, 0x10) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r5}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r5}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) 1.915360844s ago: executing program 0 (id=4875): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x0, 0x5, 0x8, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x5, 0xc}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f0000000500)="059e949c5aa72b3c50778f9a5a5322a35037bcedfdda6d6ebcd483e42cad229a6354afdf8006d87ff9acea86bff31b3ee3799cd1771952438f78773cadb5ca306e7950d6ed473d36aee5992b8ab245318102e0e3771a0acdd8c1504dc0b588835b9ad91ee364b9929decefda35af84d6b7f59e83ac23f4ff4cc6651e960f907b39bd2d3fc06f34dfcb19d0d721f7ba27be0d23706fc0cec2e1e369f630f425f6144fa71707639adb9256c0f8f87dbbaf3dc6b60ac53c8c4d90e003d1ed66e0ddcdd0b43a5e2bfb60fd70344aa35a28df8208277f3806a5bdafa7f960387200a0", &(0x7f0000000200)=""/20, 0x4}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x8, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000200)={r2, &(0x7f0000000080), &(0x7f0000000000)=""/10, 0x3}, 0x20) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x1ff000, 0x81, 0x7f, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="7a0a00ff0000000071105e00000b000095000000000001bee36b9044069cd66a542ddb070000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000580)={r4, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x72d57cb5528fe5f3) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x20001439) close(r5) close(0xffffffffffffffff) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) 1.763901836s ago: executing program 4 (id=4876): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r2, 0x0, &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r1, &(0x7f0000000000), &(0x7f0000000180)=""/111}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) 1.672613824s ago: executing program 1 (id=4877): write$cgroup_devices(0xffffffffffffffff, &(0x7f0000000380)=ANY=[@ANYBLOB="9f4b"], 0xa) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000000)=ANY=[@ANYBLOB='O'], 0x0}, 0x90) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8946, &(0x7f0000000900)={'wg2\x00', @random='\x00\x00\x00 \x00'}) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000000c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_int(r1, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x89f0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000000800)=ANY=[], 0x0}, 0x90) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000200)=r3, 0x4) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x9, 0x4, &(0x7f0000000040)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x2, 0x1, 0x1a}], {0x95, 0x0, 0x700}}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xc}, 0x80) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r4) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r4) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x3}, 0x67) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r6}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000140)=@base={0x6, 0x4, 0x8000, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000580)={r3, 0x0, 0x73, 0xe8, &(0x7f0000000280)="fe488df7c4f6e8465e7dc575b71925d3a4a2cd5ba6412356d58f404097a34ea42db091dd153abedf6fc313c5fc0a96473d268c5cf4c599386031a9557b49a02cf35cd2e8c56b1c9421d5acf4767bfb035adf65e13fd94ac68f4124bdf1efdea1160bfd24258f4fb7aefabe6aaccaa282eccce0", &(0x7f0000000480)=""/232, 0x9, 0x0, 0x7a, 0xef, &(0x7f0000000300)="c026e485c1410ea7c83f204559f397834aea8aae7566c0f9d8135544e765f627aca747fbbe0fc3a39a95e6f6d1c9b594f108ff927f2c02671b33c80f401b0e92c8ca4162adc9be4ed319c010f9bb4e035de0b2f11ffe29ff64d9e09be9ffc260c5d2f0179b7535c3e8cfdb0c5d59a12333bf835742aa0181e110", &(0x7f0000000700)="141eaad482acead2260b2e28ccbebe7dce2a8bb652747d07cdf041a795f041eec84b531d71a6e6d5d820cab2fcbdaf04bf38471a9b4f6329ccd9bc6ac3dbd3abf8d3e2df83c27941e8c55a0dff47ec0b450351446d3eeac98d38c3a1650c8d7168c9a0199252eb582b0a3fbc30fa80cb30e9d6c8a39458d3f3a84e4c85d94b6004559f46c9da31a925d1b10f618384b8d6d10131d332884ba6bb62f8b22f9cb754136cf21dfcd4390f92c4173096a9fdcab86ac8ae0abedf61600655b27e623375d0461a0b497d529c15d1e11ed6c2ba873ba5bb4a1a1accd82c2c9261d3031d3b18ef5f078dc1a5f08b9d3928d980", 0x3, 0x0, 0x8e6}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) 1.672123763s ago: executing program 0 (id=4878): bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffea2) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffe52) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x2400, 0xffffffffffffffff, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0xfffffffc}, 0xfffffffffffffe02) r1 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0x8, 0x0, 0x4, 0x101, 0x0, 0x1, 0x5}, 0x48) bpf$ENABLE_STATS(0x20, &(0x7f00000001c0), 0x4) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x894a, &(0x7f0000000cc0)='lo:\x96o8\x14d\xa1\xba\xda\xd1\xa0J\x12tQ\xb16\xe3\xd7\\b\x8b\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\xff\xe6\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf\xc8>Y\x1a\xfc\x1f9OB\x81\x89\xb7l\xed}\xe5\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x02\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2ak\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x01\x00\x00\x00\xd3\r7\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xd5s2\x9cVF\xd5\x18\xfe\x0f\x8f \x01\x00\x00\xb1\x88\xebW_\xa5\xe1\xf6\x8aj\xca\xf8m\xab\xe8\x99\xeb\xe1\xde\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\rh^J-\xd1\xfc\xfa 6(%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x1f\x9c,\x113\x7f\x03\x93\xe1\xcc\xe7f\r\xf3\xff0\f\x82%_\x92\x8b\xc4\xb9\xd9\xe7\xf2\xe4\xc1i\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02!\xed\xff\xee$\xc89\x8cB0\xd1\xa8\xd4\xe6K0\xe1\xa3TS\x18\xe6x\x1f%P\x9fU)\x83E\n\x90M\r.\x85gn_\xb2\xe9\x8a\x1c\xe3\x93\xd8\xbc\xb6N\xc3\xe1\xafh\xa0iF\xdcq\xf9\x17\xd9i\x844E\x1a\x13\x9a\xe6\xd3\xab:PM\xfbe\xfe9\xd9\x94\x1dx\xd6\x03b\xf7\x10N\xd1\x93\rU\x7fy\x18tE\xf1*\x9a0Z\x9f\xdc{\x13\xf6\xb7\xf7\xe6=\x9cD\x108\x8eS\xa0\xd0\xa7\tn\xd9\xae\xc0\x18~x[\x85Y\xb2\x82w\x150\x97\xba\xe6\xca\xb1\xa3\x02\x14^\xbdZ\xae\xf5/\xcf\xb8\xea8Uw\x92`\"2\x81j\xbb\x87+\x89\xc50xffffffffffffffff}) setsockopt$sock_attach_bpf(r5, 0x1, 0x27, &(0x7f0000000040), 0x4) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18020000000000ef0000000000000000850000005300000085000000050000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x4, 0xc0, &(0x7f0000000140)=""/192}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r6, 0x0, 0xe, 0x3a, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xfeff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) perf_event_open(&(0x7f0000001380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0x3, &(0x7f0000000800)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000200)={0x0, 0xfffffffc}, 0x10}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000040)={0xffffffffffffffff, 0xe0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x55, 0x0, 0x0, 0x10, &(0x7f0000001a00), 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r7, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000000), 0x12) ioctl$TUNSETIFF(r1, 0x400454ca, 0x0) 1.536490115s ago: executing program 4 (id=4879): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x0, 0x8, 0x9, 0x400, 0xffffffffffffffff, 0xfffffffc}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x2, 0x17, &(0x7f0000000880)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {0x85, 0x0, 0x0, 0x76}}, {{0x6, 0x0, 0x2, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32, @ANYBLOB], 0x0}, 0x90) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, r1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x0, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000070018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3f, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000000020000000000000000018190000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) 1.372326918s ago: executing program 0 (id=4880): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{0xffffffffffffffff, 0xffffffffffffffff}, 0x0, &(0x7f0000000600)='%-010d \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0xf6bb, 0x8, 0x4002, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x5}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB='+blkio +ne\x00 '], 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='tlb_flush\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x7fe2}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x15) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r9], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x3, &(0x7f0000000380)=@raw=[@exit, @map_fd={0x18, 0xa, 0x1, 0x0, r6}], &(0x7f00000003c0)='syzkaller\x00', 0x7ff, 0x1000, &(0x7f0000001340)=""/4096, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x2, 0x2, 0x2, 0x1000}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000500)=[r3, r0, r0, r2, r6, r7, r4, r6, r2], &(0x7f0000000540)=[{0x3, 0x2, 0xf, 0x18}, {0x0, 0x2, 0x3, 0xb}], 0x10, 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f00000002c0)='pwc_handler_enter\x00', r11}, 0x10) close(r10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00'}, 0x10) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r12}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r12}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 1.048175364s ago: executing program 3 (id=4882): r0 = openat$cgroup(0xffffffffffffffff, &(0x7f0000000700)='syz1\x00', 0x200002, 0x0) r1 = openat$cgroup_ro(r0, &(0x7f0000000080)='blkio.bfq.sectors\x00', 0x26e1, 0x0) close(r1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x1a1202, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r1, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000300)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8, &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000380)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x53, &(0x7f00000003c0)=[{}, {}], 0x10, 0x10, &(0x7f0000000400), &(0x7f00000004c0), 0x8, 0xe9, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0x7, 0xffffffff, 0xa6d0, 0x1274, 0xffffffffffffffff, 0x6, '\x00', r2, r1, 0x0, 0x1, 0x5, 0x4}, 0x48) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7a}, 0x90) close(r4) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN_UNNAMED(0x11, &(0x7f0000000280)={0x0, r1}, 0x10) ioctl$PERF_EVENT_IOC_PERIOD(r6, 0x40082404, &(0x7f00000002c0)=0x200) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000200)={r3, &(0x7f0000000180)="ecefdadad6b99e324b85601b76d671278b8dd4b27b2c626e491d71f94ba6d94f50776aefa2eec5ad9c3abf2435dbc538b5369f0e638205b78f1f87d9278faa9d7f56e1652100b74847ce9bd10295e5725632b2f2d449c86160c720b81bfc0653891f20d3372b83ab"}, 0x20) bpf$BPF_MAP_LOOKUP_AND_DELETE_ELEM(0x15, &(0x7f0000000880)={r3, &(0x7f0000000740)="2493aaf1b13745e4673b5ea1ad8f45531a7d085db14f744c4d8764766ad864764407083ede324562400057c7dd8d5c5b99685fb5f76895f93ce1759065ba70be78ec5214147d34b2ad07b2aa3eb9ac48b310ace184f52e4be984c6a29b7e86a7fc504d10285748c5ea7e3c3594aa1dbe70a16cf7ffe745f0e72ca394fafe2615911ed76fbbfe22caef393078d637a85aefce1f297eb648fa5c997df30b1fec1a2b02d670e565973f5f022c39f667c9e3d8ba17852c66bcfdd1102f7ca1892810dc55fd6894f1050b75d27978023bc5b1ad897517700b6e69", &(0x7f0000000840)=""/18, 0x4}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) ioctl$TUNSETOFFLOAD(r1, 0xc004743e, 0x20001400) write$cgroup_subtree(r1, 0x0, 0x9) 1.016012667s ago: executing program 4 (id=4883): socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) ioctl$SIOCSIFHWADDR(r0, 0x8924, 0x0) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r2, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) recvmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f00000006c0), &(0x7f00000000c0)=""/109}, 0x20) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0), 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) recvmsg$unix(r7, &(0x7f0000000400)={&(0x7f0000000280), 0x6e, &(0x7f0000000800)=[{&(0x7f0000000340)=""/161, 0xa1}, {&(0x7f00000004c0)=""/113, 0x71}, {&(0x7f0000000780)=""/111, 0x6f}, {&(0x7f00000001c0)=""/51, 0x33}, {&(0x7f0000000b00)=""/182, 0xb6}], 0x5, &(0x7f0000000bc0)=[@rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}], 0xa0}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x2, 0x17, &(0x7f0000000880)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r6}, {}, {}, {0x85, 0x0, 0x0, 0x5}}, {{0x6, 0x0, 0x2, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 984.18043ms ago: executing program 1 (id=4884): bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000640)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000005c0), &(0x7f0000000600)='%-010d \x00'}, 0x20) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@bloom_filter={0x1e, 0x7, 0xf6bb, 0x8, 0x4002, 0xffffffffffffffff, 0x2, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x2, 0x5}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB='+blkio +ne\x00 '], 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000300)='tlb_flush\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x0, 0x0, 0x7fe2}, 0x48) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) close(r8) ioctl$TUNSETOFFLOAD(0xffffffffffffffff, 0x400454d0, 0x15) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r9], 0x18}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x3, &(0x7f0000000380)=@raw=[@exit, @map_fd={0x18, 0xa, 0x1, 0x0, r6}], &(0x7f00000003c0)='syzkaller\x00', 0x7ff, 0x1000, &(0x7f0000001340)=""/4096, 0x41000, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0x9, 0x1}, 0x8, 0x10, &(0x7f00000004c0)={0x2, 0x2, 0x2, 0x1000}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000500)=[r3, r0, r0, r2, r6, r7, r4, r6, r2], &(0x7f0000000540)=[{0x3, 0x2, 0xf, 0x18}, {0x0, 0x2, 0x3, 0xb}], 0x10, 0x4}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f00000002c0)='pwc_handler_enter\x00', r11}, 0x10) close(r10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='jbd2_handle_extend\x00'}, 0x10) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x16, 0x1c, &(0x7f0000000d80)=@ringbuf={{0x18, 0x8}, {{0x18, 0x1, 0x1, 0x0, r12}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x1ab92b}, {0x85, 0x0, 0x0, 0x8}, {0x4}}, {{0x5, 0x0, 0x4, 0x9, 0x0, 0x1, 0x2000}}, [@snprintf={{0x7, 0x0, 0xb, 0x2}, {0x3, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x0, 0xb, 0x9}, {0x3, 0x3, 0x3, 0xa, 0xa}, {0x7, 0x1, 0xb, 0x7, 0x2}, {0x7, 0x0, 0x0, 0x8, 0x0, 0x0, 0xfffffdff}, {}, {}, {0x4, 0x0, 0xc}, {0x18, 0x2, 0x2, 0x0, r12}, {}, {0x46, 0x8, 0xffef, 0x76}}], {{0x7, 0x1, 0xb, 0x8}, {0x6, 0x0, 0x5, 0x9}}}, &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x62008000, 0x0, 0x0, 0x0, 0x0, 0x0) 902.075457ms ago: executing program 3 (id=4885): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x2, 0x7fe2, 0x1}, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x2, 0x7fe2, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)=@generic={&(0x7f0000000300)='./file0\x00', r0, 0xffffffff}, 0x18) 893.503357ms ago: executing program 3 (id=4886): bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000038500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffc4, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000003c0)='fdb_delete\x00', r1}, 0x10) (rerun: 32) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0xa, 0x5, 0x2, 0x7, 0x0, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffdbf) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) unlink(0x0) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000980), 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x21, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0xe, 0xe, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1d}, 0x90) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x3e1c01, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, 0x0) 810.378664ms ago: executing program 3 (id=4887): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@bloom_filter={0x1e, 0x0, 0x5, 0x8, 0x0, r0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x4, 0x5, 0xc}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000280)={r1, &(0x7f0000000500)="059e949c5aa72b3c50778f9a5a5322a35037bcedfdda6d6ebcd483e42cad229a6354afdf8006d87ff9acea86bff31b3ee3799cd1771952438f78773cadb5ca306e7950d6ed473d36aee5992b8ab245318102e0e3771a0acdd8c1504dc0b588835b9ad91ee364b9929decefda35af84d6b7f59e83ac23f4ff4cc6651e960f907b39bd2d3fc06f34dfcb19d0d721f7ba27be0d23706fc0cec2e1e369f630f425f6144fa71707639adb9256c0f8f87dbbaf3dc6b60ac53c8c4d90e003d1ed66e0ddcdd0b43a5e2bfb60fd70344aa35a28df8208277f3806a5bdafa7f960387200a0", &(0x7f0000000200)=""/20, 0x4}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x19, 0x4, 0x8, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000200)={r2, &(0x7f0000000080), &(0x7f0000000000)=""/10, 0x3}, 0x20) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x5, 0x1ff000, 0x81, 0x7f, 0x1}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x0, 0x3, &(0x7f0000000340)=ANY=[@ANYBLOB="7a0a00ff0000000071105e00000b000095000000000001bee36b9044069cd66a542ddb070000"], &(0x7f0000000480)='syzkaller\x00'}, 0x80) bpf$MAP_GET_NEXT_KEY(0x15, &(0x7f0000000580)={r4, 0x0, 0x0}, 0x20) bpf$MAP_CREATE(0x0, 0x0, 0x72d57cb5528fe5f3) r5 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r5, 0xc004743e, 0x20001439) close(r5) close(0xffffffffffffffff) bpf$MAP_GET_NEXT_KEY(0x2, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) 473.825261ms ago: executing program 0 (id=4888): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) close(r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000e40)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r3, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) (fail_nth: 5) 0s ago: executing program 4 (id=4889): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x8}, 0xfffffffffffffffc) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) kernel console output (not intermixed with test programs): 884035][ T5777] do_syscall_64+0x3d/0xb0 [ 157.888288][ T5777] ? sysvec_call_function_single+0x52/0xb0 [ 157.894104][ T5777] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 157.899833][ T5777] RIP: 0033:0x7f1e257eff19 [ 157.904087][ T5777] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 157.924307][ T5777] RSP: 002b:00007f1e24a71048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 157.932554][ T5777] RAX: ffffffffffffffda RBX: 00007f1e2597ff60 RCX: 00007f1e257eff19 [ 157.940366][ T5777] RDX: 0000000000000020 RSI: 0000000020000580 RDI: 0000000000000015 [ 157.948175][ T5777] RBP: 00007f1e24a710a0 R08: 0000000000000000 R09: 0000000000000000 [ 157.955986][ T5777] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 157.963891][ T5777] R13: 000000000000000b R14: 00007f1e2597ff60 R15: 00007ffdf90ff878 [ 157.971708][ T5777] [ 158.140108][ T5786] bpf_get_probe_write_proto: 2 callbacks suppressed [ 158.140126][ T5786] syz.2.2063[5786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.146678][ T5786] syz.2.2063[5786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.251862][ T5786] syz.2.2063[5786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 158.305071][ T5786] syz.2.2063[5786] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.036845][ T5827] syz.1.2076[5827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.074431][ T5826] FAULT_INJECTION: forcing a failure. [ 159.074431][ T5826] name failslab, interval 1, probability 0, space 0, times 0 [ 159.132184][ T5827] syz.1.2076[5827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.132978][ T5827] syz.1.2076[5827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.144735][ T5826] CPU: 0 PID: 5826 Comm: syz.0.2080 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 159.165558][ T5826] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 159.175453][ T5826] Call Trace: [ 159.178576][ T5826] [ 159.181440][ T5826] dump_stack_lvl+0x151/0x1b7 [ 159.185954][ T5826] ? io_uring_drop_tctx_refs+0x190/0x190 [ 159.191424][ T5826] ? __traceiter_percpu_alloc_percpu+0xd2/0xf0 [ 159.197500][ T5826] dump_stack+0x15/0x17 [ 159.201192][ T5827] syz.1.2076[5827] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.201484][ T5826] should_fail+0x3c6/0x510 [ 159.216944][ T5826] __should_failslab+0xa4/0xe0 [ 159.221537][ T5826] should_failslab+0x9/0x20 [ 159.225876][ T5826] slab_pre_alloc_hook+0x37/0xd0 [ 159.230651][ T5826] kmem_cache_alloc_trace+0x48/0x210 [ 159.235771][ T5826] ? selinux_bpf_map_alloc+0x51/0x140 [ 159.240981][ T5826] selinux_bpf_map_alloc+0x51/0x140 [ 159.246098][ T5826] security_bpf_map_alloc+0x62/0x90 [ 159.251139][ T5826] map_create+0x13bf/0x2050 [ 159.255570][ T5826] __sys_bpf+0x296/0x760 [ 159.259639][ T5826] ? fput_many+0x160/0x1b0 [ 159.263890][ T5826] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 159.269102][ T5826] ? debug_smp_processor_id+0x17/0x20 [ 159.274305][ T5826] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 159.280331][ T5826] __x64_sys_bpf+0x7c/0x90 [ 159.284582][ T5826] do_syscall_64+0x3d/0xb0 [ 159.288833][ T5826] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 159.294562][ T5826] RIP: 0033:0x7f3b5e5aff19 [ 159.298816][ T5826] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 159.318346][ T5826] RSP: 002b:00007f3b5d831048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 159.326593][ T5826] RAX: ffffffffffffffda RBX: 00007f3b5e73ff60 RCX: 00007f3b5e5aff19 [ 159.334416][ T5826] RDX: 0000000000000048 RSI: 00000000200009c0 RDI: 0000000000000000 [ 159.342210][ T5826] RBP: 00007f3b5d8310a0 R08: 0000000000000000 R09: 0000000000000000 [ 159.350023][ T5826] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 159.357836][ T5826] R13: 000000000000000b R14: 00007f3b5e73ff60 R15: 00007ffd11695088 [ 159.366087][ T5826] [ 160.078084][ T5850] device syzkaller0 entered promiscuous mode [ 160.514315][ T5864] device pim6reg1 entered promiscuous mode [ 160.612626][ T5868] syz.1.2094[5868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 160.612703][ T5868] syz.1.2094[5868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 161.301675][ T5886] device syzkaller0 entered promiscuous mode [ 161.749915][ T5906] device pim6reg1 entered promiscuous mode [ 162.699314][ T5922] device syzkaller0 entered promiscuous mode [ 163.172626][ T5946] FAULT_INJECTION: forcing a failure. [ 163.172626][ T5946] name failslab, interval 1, probability 0, space 0, times 0 [ 163.221056][ T5946] CPU: 1 PID: 5946 Comm: syz.1.2119 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 163.230802][ T5946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 163.240689][ T5946] Call Trace: [ 163.243809][ T5946] [ 163.246586][ T5946] dump_stack_lvl+0x151/0x1b7 [ 163.251102][ T5946] ? io_uring_drop_tctx_refs+0x190/0x190 [ 163.256657][ T5946] dump_stack+0x15/0x17 [ 163.260655][ T5946] should_fail+0x3c6/0x510 [ 163.264914][ T5946] __should_failslab+0xa4/0xe0 [ 163.269502][ T5946] should_failslab+0x9/0x20 [ 163.273923][ T5946] slab_pre_alloc_hook+0x37/0xd0 [ 163.278788][ T5946] ? __request_module+0x2ad/0x8e0 [ 163.283647][ T5946] __kmalloc_track_caller+0x6c/0x260 [ 163.288767][ T5946] ? __request_module+0x2ad/0x8e0 [ 163.293799][ T5946] ? __kasan_kmalloc+0x9/0x10 [ 163.298319][ T5946] kstrdup+0x34/0x70 [ 163.302045][ T5946] __request_module+0x2ad/0x8e0 [ 163.306736][ T5946] ? capable+0x78/0xe0 [ 163.310640][ T5946] ? _trace_android_vh_delayacct_thrashing_end+0x120/0x120 [ 163.317847][ T5946] ? security_capable+0x87/0xb0 [ 163.322529][ T5946] dev_load+0x5b/0xb0 [ 163.326349][ T5946] dev_ioctl+0x536/0xe70 [ 163.330428][ T5946] sock_do_ioctl+0x34f/0x5a0 [ 163.334855][ T5946] ? sock_show_fdinfo+0xa0/0xa0 [ 163.339540][ T5946] ? selinux_file_ioctl+0x3cc/0x540 [ 163.344573][ T5946] sock_ioctl+0x455/0x740 [ 163.348750][ T5946] ? sock_poll+0x400/0x400 [ 163.352992][ T5946] ? __fget_files+0x31e/0x380 [ 163.357512][ T5946] ? security_file_ioctl+0x84/0xb0 [ 163.362741][ T5946] ? sock_poll+0x400/0x400 [ 163.366988][ T5946] __se_sys_ioctl+0x114/0x190 [ 163.371504][ T5946] __x64_sys_ioctl+0x7b/0x90 [ 163.375930][ T5946] do_syscall_64+0x3d/0xb0 [ 163.380176][ T5946] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 163.385907][ T5946] RIP: 0033:0x7fb597e1cf19 [ 163.390188][ T5946] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 163.409778][ T5946] RSP: 002b:00007fb59709e048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 163.418020][ T5946] RAX: ffffffffffffffda RBX: 00007fb597facf60 RCX: 00007fb597e1cf19 [ 163.425831][ T5946] RDX: 0000000020000000 RSI: 0000000000008924 RDI: 0000000000000006 [ 163.433734][ T5946] RBP: 00007fb59709e0a0 R08: 0000000000000000 R09: 0000000000000000 [ 163.441574][ T5946] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 163.449349][ T5946] R13: 000000000000000b R14: 00007fb597facf60 R15: 00007ffc43f1ed28 [ 163.457167][ T5946] [ 163.628102][ T30] audit: type=1400 audit(1721705300.353:137): avc: denied { sys_module } for pid=5945 comm="syz.1.2119" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 163.762288][ T5962] bpf_get_probe_write_proto: 6 callbacks suppressed [ 163.762308][ T5962] syz.1.2124[5962] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 163.857561][ T5962] syz.1.2124[5962] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 166.184295][ T6034] FAULT_INJECTION: forcing a failure. [ 166.184295][ T6034] name failslab, interval 1, probability 0, space 0, times 0 [ 166.229549][ T6034] CPU: 0 PID: 6034 Comm: syz.0.2152 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 166.239287][ T6034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 166.249176][ T6034] Call Trace: [ 166.252303][ T6034] [ 166.255136][ T6034] dump_stack_lvl+0x151/0x1b7 [ 166.259593][ T6034] ? io_uring_drop_tctx_refs+0x190/0x190 [ 166.265061][ T6034] ? kmem_cache_free+0x116/0x2e0 [ 166.269836][ T6034] ? kasan_set_track+0x5d/0x70 [ 166.274431][ T6034] ? kasan_set_free_info+0x23/0x40 [ 166.279380][ T6034] ? ____kasan_slab_free+0x126/0x160 [ 166.284500][ T6034] ? __kasan_slab_free+0x11/0x20 [ 166.289272][ T6034] ? kmem_cache_free+0x116/0x2e0 [ 166.294061][ T6034] ? putname+0xfa/0x150 [ 166.298050][ T6034] dump_stack+0x15/0x17 [ 166.302030][ T6034] should_fail+0x3c6/0x510 [ 166.306285][ T6034] __should_failslab+0xa4/0xe0 [ 166.310884][ T6034] should_failslab+0x9/0x20 [ 166.315222][ T6034] slab_pre_alloc_hook+0x37/0xd0 [ 166.319994][ T6034] __kmalloc+0x6d/0x270 [ 166.324077][ T6034] ? bpf_test_init+0x101/0x1b0 [ 166.328747][ T6034] bpf_test_init+0x101/0x1b0 [ 166.333104][ T6034] bpf_prog_test_run_skb+0x268/0x1420 [ 166.338308][ T6034] ? __kasan_check_write+0x14/0x20 [ 166.343257][ T6034] ? proc_fail_nth_write+0x20b/0x290 [ 166.348381][ T6034] ? selinux_file_permission+0x2c4/0x570 [ 166.353847][ T6034] ? proc_fail_nth_read+0x210/0x210 [ 166.358877][ T6034] ? fsnotify_perm+0x6a/0x5d0 [ 166.363396][ T6034] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 166.369118][ T6034] ? __kasan_check_write+0x14/0x20 [ 166.374068][ T6034] ? fput_many+0x160/0x1b0 [ 166.378324][ T6034] ? __bpf_prog_test_run_raw_tp+0x1d0/0x1d0 [ 166.384050][ T6034] bpf_prog_test_run+0x3b0/0x630 [ 166.388823][ T6034] ? bpf_prog_query+0x220/0x220 [ 166.393509][ T6034] ? selinux_bpf+0xd2/0x100 [ 166.397848][ T6034] ? security_bpf+0x82/0xb0 [ 166.402189][ T6034] __sys_bpf+0x525/0x760 [ 166.406352][ T6034] ? fput_many+0x160/0x1b0 [ 166.410696][ T6034] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 166.415905][ T6034] ? debug_smp_processor_id+0x17/0x20 [ 166.421108][ T6034] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 166.427013][ T6034] __x64_sys_bpf+0x7c/0x90 [ 166.431270][ T6034] do_syscall_64+0x3d/0xb0 [ 166.435524][ T6034] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 166.441263][ T6034] RIP: 0033:0x7f3b5e5aff19 [ 166.445684][ T6034] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 166.465466][ T6034] RSP: 002b:00007f3b5d831048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 166.473791][ T6034] RAX: ffffffffffffffda RBX: 00007f3b5e73ff60 RCX: 00007f3b5e5aff19 [ 166.481601][ T6034] RDX: 000000000000002c RSI: 0000000020000080 RDI: 000000000000000a [ 166.489587][ T6034] RBP: 00007f3b5d8310a0 R08: 0000000000000000 R09: 0000000000000000 [ 166.497408][ T6034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 166.505475][ T6034] R13: 000000000000000b R14: 00007f3b5e73ff60 R15: 00007ffd11695088 [ 166.513291][ T6034] [ 166.703067][ T6057] device wg2 left promiscuous mode [ 166.875446][ T6059] device wg2 entered promiscuous mode [ 169.031193][ T6119] FAULT_INJECTION: forcing a failure. [ 169.031193][ T6119] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 169.048271][ T6119] CPU: 0 PID: 6119 Comm: syz.0.2184 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 169.058550][ T6119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 169.068603][ T6119] Call Trace: [ 169.071788][ T6119] [ 169.074570][ T6119] dump_stack_lvl+0x151/0x1b7 [ 169.079080][ T6119] ? io_uring_drop_tctx_refs+0x190/0x190 [ 169.084637][ T6119] ? __kasan_check_write+0x14/0x20 [ 169.089578][ T6119] dump_stack+0x15/0x17 [ 169.093574][ T6119] should_fail+0x3c6/0x510 [ 169.097826][ T6119] should_fail_usercopy+0x1a/0x20 [ 169.102688][ T6119] _copy_from_user+0x20/0xd0 [ 169.107113][ T6119] iovec_from_user+0xc7/0x330 [ 169.111626][ T6119] __import_iovec+0x6d/0x420 [ 169.116051][ T6119] ? __ia32_sys_shutdown+0x70/0x70 [ 169.121002][ T6119] import_iovec+0xe5/0x120 [ 169.125253][ T6119] ___sys_sendmsg+0x215/0x2e0 [ 169.129767][ T6119] ? __sys_sendmsg+0x260/0x260 [ 169.134377][ T6119] ? __fdget+0x1bc/0x240 [ 169.138531][ T6119] __se_sys_sendmsg+0x19a/0x260 [ 169.143222][ T6119] ? __x64_sys_sendmsg+0x90/0x90 [ 169.147988][ T6119] ? ksys_write+0x260/0x2c0 [ 169.152333][ T6119] ? debug_smp_processor_id+0x17/0x20 [ 169.157542][ T6119] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 169.163529][ T6119] __x64_sys_sendmsg+0x7b/0x90 [ 169.168143][ T6119] do_syscall_64+0x3d/0xb0 [ 169.172468][ T6119] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 169.178203][ T6119] RIP: 0033:0x7f3b5e5aff19 [ 169.182448][ T6119] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 169.201887][ T6119] RSP: 002b:00007f3b5d831048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 169.210138][ T6119] RAX: ffffffffffffffda RBX: 00007f3b5e73ff60 RCX: 00007f3b5e5aff19 [ 169.218045][ T6119] RDX: 0000000000000000 RSI: 0000000020004440 RDI: 0000000000000007 [ 169.226194][ T6119] RBP: 00007f3b5d8310a0 R08: 0000000000000000 R09: 0000000000000000 [ 169.234284][ T6119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 169.242105][ T6119] R13: 000000000000000b R14: 00007f3b5e73ff60 R15: 00007ffd11695088 [ 169.250093][ T6119] [ 169.442842][ T30] audit: type=1400 audit(1721705306.173:138): avc: denied { create } for pid=6136 comm="syz.1.2191" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 170.803520][ T6169] device veth0_vlan left promiscuous mode [ 170.853581][ T6169] device veth0_vlan entered promiscuous mode [ 170.986778][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 171.007150][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 171.014884][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 171.115440][ T6175] FAULT_INJECTION: forcing a failure. [ 171.115440][ T6175] name failslab, interval 1, probability 0, space 0, times 0 [ 171.127890][ T6175] CPU: 0 PID: 6175 Comm: syz.0.2205 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 171.137752][ T6175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 171.147910][ T6175] Call Trace: [ 171.151035][ T6175] [ 171.153812][ T6175] dump_stack_lvl+0x151/0x1b7 [ 171.158415][ T6175] ? io_uring_drop_tctx_refs+0x190/0x190 [ 171.163884][ T6175] dump_stack+0x15/0x17 [ 171.167882][ T6175] should_fail+0x3c6/0x510 [ 171.172127][ T6175] __should_failslab+0xa4/0xe0 [ 171.176725][ T6175] should_failslab+0x9/0x20 [ 171.181067][ T6175] slab_pre_alloc_hook+0x37/0xd0 [ 171.185836][ T6175] ? __napi_alloc_skb+0x167/0x2e0 [ 171.190701][ T6175] __kmalloc_track_caller+0x6c/0x260 [ 171.195818][ T6175] ? __napi_alloc_skb+0x167/0x2e0 [ 171.200677][ T6175] ? __napi_alloc_skb+0x167/0x2e0 [ 171.205544][ T6175] __alloc_skb+0x10c/0x550 [ 171.209796][ T6175] __napi_alloc_skb+0x167/0x2e0 [ 171.214479][ T6175] napi_get_frags+0x6a/0x170 [ 171.218906][ T6175] tun_get_user+0xd85/0x3aa0 [ 171.223417][ T6175] ? kasan_set_track+0x4b/0x70 [ 171.228131][ T6175] ? kasan_set_free_info+0x23/0x40 [ 171.233059][ T6175] ? ____kasan_slab_free+0x126/0x160 [ 171.238268][ T6175] ? _kstrtoull+0x3a0/0x4a0 [ 171.242601][ T6175] ? tun_do_read+0x1ef0/0x1ef0 [ 171.247744][ T6175] ? kstrtouint_from_user+0x20a/0x2a0 [ 171.253552][ T6175] ? kstrtol_from_user+0x310/0x310 [ 171.258763][ T6175] ? avc_policy_seqno+0x1b/0x70 [ 171.263446][ T6175] ? selinux_file_permission+0x2c4/0x570 [ 171.269480][ T6175] tun_chr_write_iter+0x1e1/0x2e0 [ 171.274342][ T6175] vfs_write+0xd5d/0x1110 [ 171.278505][ T6175] ? kmem_cache_free+0x2c3/0x2e0 [ 171.283283][ T6175] ? file_end_write+0x1c0/0x1c0 [ 171.287971][ T6175] ? __fdget_pos+0x209/0x3a0 [ 171.292391][ T6175] ? ksys_write+0x77/0x2c0 [ 171.296643][ T6175] ksys_write+0x199/0x2c0 [ 171.300809][ T6175] ? __ia32_sys_read+0x90/0x90 [ 171.305409][ T6175] ? debug_smp_processor_id+0x17/0x20 [ 171.310614][ T6175] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 171.316521][ T6175] __x64_sys_write+0x7b/0x90 [ 171.320961][ T6175] do_syscall_64+0x3d/0xb0 [ 171.325195][ T6175] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 171.330929][ T6175] RIP: 0033:0x7f3b5e5aff19 [ 171.335177][ T6175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 171.354618][ T6175] RSP: 002b:00007f3b5d831048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 171.362975][ T6175] RAX: ffffffffffffffda RBX: 00007f3b5e73ff60 RCX: 00007f3b5e5aff19 [ 171.370785][ T6175] RDX: 000000000000003a RSI: 0000000000000000 RDI: 0000000000000003 [ 171.378591][ T6175] RBP: 00007f3b5d8310a0 R08: 0000000000000000 R09: 0000000000000000 [ 171.386402][ T6175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 171.394218][ T6175] R13: 000000000000000b R14: 00007f3b5e73ff60 R15: 00007ffd11695088 [ 171.402042][ T6175] [ 171.502640][ T6195] syz.2.2209[6195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.502715][ T6195] syz.2.2209[6195] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.566607][ T6199] syz.2.2209[6199] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.948421][ T6209] device veth0_vlan left promiscuous mode [ 171.975753][ T6209] device veth0_vlan entered promiscuous mode [ 172.349304][ T6238] syz.2.2226[6238] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.349388][ T6238] syz.2.2226[6238] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.381484][ T6238] syz.2.2226[6238] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 172.393719][ T6238] syz.2.2226[6238] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 174.010874][ C0] sched: RT throttling activated [ 174.512643][ T6264] device veth0_vlan left promiscuous mode [ 174.578548][ T6264] device veth0_vlan entered promiscuous mode [ 174.731688][ T6259] bridge0: port 1(bridge_slave_0) entered blocking state [ 174.745100][ T6259] bridge0: port 1(bridge_slave_0) entered disabled state [ 174.760243][ T6259] device bridge_slave_0 entered promiscuous mode [ 174.828163][ T6259] bridge0: port 2(bridge_slave_1) entered blocking state [ 174.850585][ T6259] bridge0: port 2(bridge_slave_1) entered disabled state [ 174.859703][ T6259] device bridge_slave_1 entered promiscuous mode [ 174.924171][ T6276] FAULT_INJECTION: forcing a failure. [ 174.924171][ T6276] name failslab, interval 1, probability 0, space 0, times 0 [ 174.937040][ T6276] CPU: 0 PID: 6276 Comm: syz.3.2241 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 174.946759][ T6276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 174.956824][ T6276] Call Trace: [ 174.959946][ T6276] [ 174.962742][ T6276] dump_stack_lvl+0x151/0x1b7 [ 174.967240][ T6276] ? io_uring_drop_tctx_refs+0x190/0x190 [ 174.972711][ T6276] dump_stack+0x15/0x17 [ 174.976697][ T6276] should_fail+0x3c6/0x510 [ 174.980956][ T6276] __should_failslab+0xa4/0xe0 [ 174.985551][ T6276] should_failslab+0x9/0x20 [ 174.989890][ T6276] slab_pre_alloc_hook+0x37/0xd0 [ 174.994668][ T6276] kmem_cache_alloc_trace+0x48/0x210 [ 174.999786][ T6276] ? __get_vm_area_node+0x117/0x360 [ 175.004818][ T6276] ? do_sys_openat2+0x71c/0x830 [ 175.009595][ T6276] __get_vm_area_node+0x117/0x360 [ 175.014469][ T6276] __vmalloc_node_range+0xe2/0x8d0 [ 175.019400][ T6276] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 175.024794][ T6276] ? selinux_capset+0xf0/0xf0 [ 175.029295][ T6276] ? kstrtouint_from_user+0x20a/0x2a0 [ 175.034522][ T6276] ? kstrtol_from_user+0x310/0x310 [ 175.039453][ T6276] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 175.044857][ T6276] __vmalloc+0x7a/0x90 [ 175.048744][ T6276] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 175.054150][ T6276] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 175.059323][ T6276] ? bpf_prog_alloc+0x15/0x1e0 [ 175.063928][ T6276] bpf_prog_alloc+0x1f/0x1e0 [ 175.068351][ T6276] bpf_prog_load+0x800/0x1b50 [ 175.072875][ T6276] ? map_freeze+0x370/0x370 [ 175.077208][ T6276] ? selinux_bpf+0xcb/0x100 [ 175.081543][ T6276] ? security_bpf+0x82/0xb0 [ 175.085881][ T6276] __sys_bpf+0x4bc/0x760 [ 175.089964][ T6276] ? fput_many+0x160/0x1b0 [ 175.094309][ T6276] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 175.099518][ T6276] ? debug_smp_processor_id+0x17/0x20 [ 175.104718][ T6276] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 175.110620][ T6276] __x64_sys_bpf+0x7c/0x90 [ 175.114876][ T6276] do_syscall_64+0x3d/0xb0 [ 175.119124][ T6276] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 175.124854][ T6276] RIP: 0033:0x7f1e257eff19 [ 175.129114][ T6276] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 175.148547][ T6276] RSP: 002b:00007f1e24a71048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 175.156790][ T6276] RAX: ffffffffffffffda RBX: 00007f1e2597ff60 RCX: 00007f1e257eff19 [ 175.164694][ T6276] RDX: 0000000000000090 RSI: 0000000020000a40 RDI: 0000000000000005 [ 175.172502][ T6276] RBP: 00007f1e24a710a0 R08: 0000000000000000 R09: 0000000000000000 [ 175.180311][ T6276] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 175.188121][ T6276] R13: 000000000000000b R14: 00007f1e2597ff60 R15: 00007ffdf90ff878 [ 175.195941][ T6276] [ 175.199133][ T6276] syz.3.2241: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz3,mems_allowed=0 [ 175.219505][ T6276] CPU: 1 PID: 6276 Comm: syz.3.2241 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 175.229431][ T6276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 175.239496][ T6276] Call Trace: [ 175.242622][ T6276] [ 175.245400][ T6276] dump_stack_lvl+0x151/0x1b7 [ 175.249969][ T6276] ? io_uring_drop_tctx_refs+0x190/0x190 [ 175.255379][ T6276] ? pr_cont_kernfs_name+0xf0/0x100 [ 175.260412][ T6276] dump_stack+0x15/0x17 [ 175.264405][ T6276] warn_alloc+0x21a/0x390 [ 175.268576][ T6276] ? zone_watermark_ok_safe+0x270/0x270 [ 175.273965][ T6276] ? kmem_cache_alloc_trace+0x115/0x210 [ 175.279333][ T6276] ? __get_vm_area_node+0x117/0x360 [ 175.284367][ T6276] ? __get_vm_area_node+0x347/0x360 [ 175.289575][ T6276] __vmalloc_node_range+0x2c1/0x8d0 [ 175.294607][ T6276] ? selinux_capset+0xf0/0xf0 [ 175.299121][ T6276] ? kstrtouint_from_user+0x20a/0x2a0 [ 175.304328][ T6276] ? kstrtol_from_user+0x310/0x310 [ 175.309277][ T6276] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 175.314657][ T6276] __vmalloc+0x7a/0x90 [ 175.318565][ T6276] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 175.324118][ T6276] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 175.329326][ T6276] ? bpf_prog_alloc+0x15/0x1e0 [ 175.333929][ T6276] bpf_prog_alloc+0x1f/0x1e0 [ 175.338457][ T6276] bpf_prog_load+0x800/0x1b50 [ 175.343445][ T6276] ? map_freeze+0x370/0x370 [ 175.347885][ T6276] ? selinux_bpf+0xcb/0x100 [ 175.352204][ T6276] ? security_bpf+0x82/0xb0 [ 175.356632][ T6276] __sys_bpf+0x4bc/0x760 [ 175.360710][ T6276] ? fput_many+0x160/0x1b0 [ 175.364968][ T6276] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 175.370172][ T6276] ? debug_smp_processor_id+0x17/0x20 [ 175.375380][ T6276] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 175.381282][ T6276] __x64_sys_bpf+0x7c/0x90 [ 175.385533][ T6276] do_syscall_64+0x3d/0xb0 [ 175.389784][ T6276] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 175.395513][ T6276] RIP: 0033:0x7f1e257eff19 [ 175.399768][ T6276] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 175.419295][ T6276] RSP: 002b:00007f1e24a71048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 175.427541][ T6276] RAX: ffffffffffffffda RBX: 00007f1e2597ff60 RCX: 00007f1e257eff19 [ 175.435876][ T6276] RDX: 0000000000000090 RSI: 0000000020000a40 RDI: 0000000000000005 [ 175.443775][ T6276] RBP: 00007f1e24a710a0 R08: 0000000000000000 R09: 0000000000000000 [ 175.451579][ T6276] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 175.459398][ T6276] R13: 000000000000000b R14: 00007f1e2597ff60 R15: 00007ffdf90ff878 [ 175.467215][ T6276] [ 175.475690][ T6276] Mem-Info: [ 175.479137][ T6276] active_anon:115 inactive_anon:3245 isolated_anon:0 [ 175.479137][ T6276] active_file:19250 inactive_file:3340 isolated_file:0 [ 175.479137][ T6276] unevictable:0 dirty:479 writeback:0 [ 175.479137][ T6276] slab_reclaimable:6829 slab_unreclaimable:74939 [ 175.479137][ T6276] mapped:18029 shmem:177 pagetables:494 bounce:0 [ 175.479137][ T6276] kernel_misc_reclaimable:0 [ 175.479137][ T6276] free:1562932 free_pcp:23221 free_cma:0 [ 175.520426][ T6276] Node 0 active_anon:460kB inactive_anon:13180kB active_file:77000kB inactive_file:13360kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:72116kB dirty:1916kB writeback:0kB shmem:708kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4764kB pagetables:1976kB all_unreclaimable? no [ 175.551593][ T6276] DMA32 free:2976724kB min:62592kB low:78240kB high:93888kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2981396kB mlocked:0kB bounce:0kB free_pcp:4672kB local_pcp:56kB free_cma:0kB [ 175.578859][ T6276] lowmem_reserve[]: 0 3941 3941 [ 175.583729][ T6276] Normal free:3274764kB min:84860kB low:106072kB high:127284kB reserved_highatomic:0KB active_anon:460kB inactive_anon:13180kB active_file:77000kB inactive_file:13360kB unevictable:0kB writepending:436kB present:5242880kB managed:4035840kB mlocked:0kB bounce:0kB free_pcp:88384kB local_pcp:42420kB free_cma:0kB [ 175.622201][ T6276] lowmem_reserve[]: 0 0 0 [ 175.626373][ T6276] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 4*2048kB (UM) 723*4096kB (M) = 2976724kB [ 175.641654][ T6276] Normal: 1057*4kB (UME) 407*8kB (ME) 239*16kB (UME) 759*32kB (UME) 332*64kB (UME) 104*128kB (UME) 42*256kB (UME) 14*512kB (UME) 4*1024kB (ME) 4*2048kB (UME) 775*4096kB (M) = 3274764kB [ 175.659872][ T6276] 22767 total pagecache pages [ 175.669935][ T6276] 0 pages in swap cache [ 175.674216][ T6276] Swap cache stats: add 0, delete 0, find 0/0 [ 175.680244][ T6276] Free swap = 124996kB [ 175.684814][ T6276] Total swap = 124996kB [ 175.694544][ T6276] 2097051 pages RAM [ 175.698238][ T6276] 0 pages HighMem/MovableOnly [ 175.708095][ T6276] 342742 pages reserved [ 175.712362][ T6276] 0 pages cma reserved [ 175.884638][ T6299] syz.2.2247[6299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.884715][ T6299] syz.2.2247[6299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 175.954630][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 175.956607][ T6302] syz.2.2247[6302] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.030514][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 176.181589][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 176.205008][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 176.257470][ T632] bridge0: port 1(bridge_slave_0) entered blocking state [ 176.264361][ T632] bridge0: port 1(bridge_slave_0) entered forwarding state [ 176.352539][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 176.405892][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 176.457974][ T632] bridge0: port 2(bridge_slave_1) entered blocking state [ 176.464875][ T632] bridge0: port 2(bridge_slave_1) entered forwarding state [ 176.551245][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 176.604663][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 176.673828][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 176.714261][ T6309] bpf_get_probe_write_proto: 1 callbacks suppressed [ 176.714280][ T6309] syz.2.2251[6309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.721582][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 176.726104][ T6309] syz.2.2251[6309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.742208][ T6259] device veth0_vlan entered promiscuous mode [ 176.763448][ T6309] syz.2.2251[6309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.763535][ T6309] syz.2.2251[6309] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 176.775205][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 176.795312][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 176.863270][ T6259] device veth1_macvtap entered promiscuous mode [ 176.891414][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 176.898801][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 176.946839][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 176.987329][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 177.037786][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 177.098139][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 177.147395][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 177.236858][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 177.276561][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 177.704303][ T6336] syz.3.2260[6336] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.704378][ T6336] syz.3.2260[6336] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.726115][ T6335] syz.2.2261[6335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.808353][ T6340] syz.2.2261[6340] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.812000][ T6336] syz.3.2260[6336] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 177.831770][ T6335] syz.2.2261[6335] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 178.153532][ T6348] device pim6reg1 entered promiscuous mode [ 182.172278][ T6468] FAULT_INJECTION: forcing a failure. [ 182.172278][ T6468] name failslab, interval 1, probability 0, space 0, times 0 [ 182.184820][ T6468] CPU: 0 PID: 6468 Comm: syz.2.2307 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 182.194528][ T6468] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 182.204441][ T6468] Call Trace: [ 182.207559][ T6468] [ 182.210323][ T6468] dump_stack_lvl+0x151/0x1b7 [ 182.214837][ T6468] ? io_uring_drop_tctx_refs+0x190/0x190 [ 182.220307][ T6468] ? __kasan_slab_alloc+0xc3/0xe0 [ 182.225169][ T6468] ? __kasan_slab_alloc+0xb1/0xe0 [ 182.230024][ T6468] ? slab_post_alloc_hook+0x53/0x2c0 [ 182.235148][ T6468] ? security_inode_alloc+0x29/0x120 [ 182.240268][ T6468] ? inode_init_always+0x76d/0x9d0 [ 182.245305][ T6468] ? new_inode_pseudo+0x93/0x220 [ 182.250077][ T6468] ? new_inode+0x28/0x1c0 [ 182.254330][ T6468] dump_stack+0x15/0x17 [ 182.258328][ T6468] should_fail+0x3c6/0x510 [ 182.262576][ T6468] __should_failslab+0xa4/0xe0 [ 182.267178][ T6468] ? __sigqueue_alloc+0x130/0x200 [ 182.272120][ T6468] should_failslab+0x9/0x20 [ 182.276981][ T6468] slab_pre_alloc_hook+0x37/0xd0 [ 182.281751][ T6468] ? __sigqueue_alloc+0x130/0x200 [ 182.286610][ T6468] kmem_cache_alloc+0x44/0x200 [ 182.291229][ T6468] __sigqueue_alloc+0x130/0x200 [ 182.295966][ T6468] __send_signal+0x1fd/0xcb0 [ 182.300331][ T6468] send_signal+0x43a/0x590 [ 182.304674][ T6468] do_send_sig_info+0xde/0x230 [ 182.309268][ T6468] group_send_sig_info+0x113/0x460 [ 182.314210][ T6468] ? is_bpf_text_address+0x172/0x190 [ 182.319334][ T6468] ? __lock_task_sighand+0x100/0x100 [ 182.324455][ T6468] ? __kernel_text_address+0x9b/0x110 [ 182.329662][ T6468] ? unwind_get_return_address+0x4d/0x90 [ 182.335128][ T6468] bpf_send_signal_common+0x2d8/0x420 [ 182.340338][ T6468] ? trace_raw_output_bpf_trace_printk+0xd0/0xd0 [ 182.346591][ T6468] ? pcpu_block_refresh_hint+0x22b/0x370 [ 182.352052][ T6468] bpf_send_signal+0x19/0x20 [ 182.356485][ T6468] bpf_prog_9fbc3d1d47c9b36c+0x1a/0x514 [ 182.361860][ T6468] bpf_trace_run7+0x1b6/0x2e0 [ 182.366373][ T6468] ? bpf_trace_run6+0x2c0/0x2c0 [ 182.371060][ T6468] ? __kasan_check_write+0x14/0x20 [ 182.376007][ T6468] ? mutex_unlock+0xb2/0x260 [ 182.380434][ T6468] __bpf_trace_percpu_alloc_percpu+0x43/0x60 [ 182.386259][ T6468] pcpu_alloc+0x1167/0x13e0 [ 182.390602][ T6468] __alloc_percpu+0x24/0x30 [ 182.394930][ T6468] perf_trace_event_init+0x205/0x950 [ 182.400052][ T6468] perf_trace_init+0x23e/0x2e0 [ 182.404665][ T6468] perf_tp_event_init+0x8c/0x110 [ 182.409440][ T6468] perf_try_init_event+0x143/0x410 [ 182.414377][ T6468] perf_event_alloc+0x1256/0x1b00 [ 182.419237][ T6468] __se_sys_perf_event_open+0xb27/0x3ce0 [ 182.424699][ T6468] ? file_end_write+0x1c0/0x1c0 [ 182.429386][ T6468] ? wait_for_completion_killable+0x11/0x30 [ 182.435113][ T6468] ? __mutex_lock_slowpath+0x10/0x10 [ 182.440234][ T6468] ? __x64_sys_perf_event_open+0xd0/0xd0 [ 182.445702][ T6468] ? __kasan_check_write+0x14/0x20 [ 182.450651][ T6468] ? fput_many+0x160/0x1b0 [ 182.454903][ T6468] ? debug_smp_processor_id+0x17/0x20 [ 182.460107][ T6468] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 182.466013][ T6468] __x64_sys_perf_event_open+0xbf/0xd0 [ 182.471307][ T6468] do_syscall_64+0x3d/0xb0 [ 182.475560][ T6468] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 182.481309][ T6468] RIP: 0033:0x7f3a4c973f19 [ 182.485544][ T6468] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 182.504990][ T6468] RSP: 002b:00007f3a4bbf5048 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 182.513226][ T6468] RAX: ffffffffffffffda RBX: 00007f3a4cb03f60 RCX: 00007f3a4c973f19 [ 182.521036][ T6468] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000020000040 [ 182.528860][ T6468] RBP: 00007f3a4bbf50a0 R08: 0000000000000000 R09: 0000000000000000 [ 182.536666][ T6468] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 182.544507][ T6468] R13: 000000000000000b R14: 00007f3a4cb03f60 R15: 00007ffc8c688428 [ 182.552296][ T6468] [ 184.298259][ T6547] device pim6reg1 entered promiscuous mode [ 184.629406][ T6581] device pim6reg1 entered promiscuous mode [ 185.137140][ T6609] device syzkaller0 entered promiscuous mode [ 185.539564][ T6623] device pim6reg1 entered promiscuous mode [ 185.838245][ T6638] bridge0: port 1(bridge_slave_0) entered blocking state [ 185.849562][ T6638] bridge0: port 1(bridge_slave_0) entered disabled state [ 185.862521][ T6638] device bridge_slave_0 entered promiscuous mode [ 185.905540][ T6649] device syzkaller0 entered promiscuous mode [ 185.922057][ T6638] bridge0: port 2(bridge_slave_1) entered blocking state [ 185.948458][ T6638] bridge0: port 2(bridge_slave_1) entered disabled state [ 185.966313][ T6638] device bridge_slave_1 entered promiscuous mode [ 186.240003][ T6666] device pim6reg1 entered promiscuous mode [ 186.336294][ T6638] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.343183][ T6638] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.350277][ T6638] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.357079][ T6638] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.394761][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 186.402946][ T377] bridge0: port 1(bridge_slave_0) entered disabled state [ 186.410193][ T377] bridge0: port 2(bridge_slave_1) entered disabled state [ 186.443973][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 186.453194][ T377] bridge0: port 1(bridge_slave_0) entered blocking state [ 186.460138][ T377] bridge0: port 1(bridge_slave_0) entered forwarding state [ 186.468196][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 186.478167][ T377] bridge0: port 2(bridge_slave_1) entered blocking state [ 186.485053][ T377] bridge0: port 2(bridge_slave_1) entered forwarding state [ 186.492778][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 186.506394][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 186.540188][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 186.554631][ T6638] device veth0_vlan entered promiscuous mode [ 186.562172][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 186.570502][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 186.578279][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 186.664780][ T6679] device syzkaller0 entered promiscuous mode [ 186.722408][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 186.730449][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 186.808771][ T6638] device veth1_macvtap entered promiscuous mode [ 186.851720][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 186.859622][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 186.879702][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 186.924625][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 186.938740][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 187.009489][ T6698] device pim6reg1 entered promiscuous mode [ 187.477221][ T6725] device syzkaller0 entered promiscuous mode [ 187.703595][ T333] device veth1_macvtap left promiscuous mode [ 188.561134][ T6763] device syzkaller0 entered promiscuous mode [ 188.640252][ T6768] device pim6reg1 entered promiscuous mode [ 188.758129][ T6773] bpf_get_probe_write_proto: 30 callbacks suppressed [ 188.758894][ T6773] syz.1.2435[6773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.863200][ T6776] syz.1.2435[6776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 188.991298][ T6773] syz.1.2435[6773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 189.216373][ T6776] syz.1.2435[6776] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 190.205070][ T6821] device syzkaller0 entered promiscuous mode [ 190.840130][ T6852] device syzkaller0 entered promiscuous mode [ 190.905996][ T6854] device pim6reg1 entered promiscuous mode [ 191.815187][ T6893] device syzkaller0 entered promiscuous mode [ 191.964992][ T6905] device pim6reg1 entered promiscuous mode [ 192.105174][ T6903] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.112206][ T6903] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.119630][ T6903] device bridge_slave_0 entered promiscuous mode [ 192.134606][ T6903] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.142078][ T6903] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.149638][ T6903] device bridge_slave_1 entered promiscuous mode [ 192.286449][ T6932] device syzkaller0 entered promiscuous mode [ 192.467103][ T6936] device pim6reg1 entered promiscuous mode [ 192.643766][ T6903] bridge0: port 2(bridge_slave_1) entered blocking state [ 192.650655][ T6903] bridge0: port 2(bridge_slave_1) entered forwarding state [ 192.657805][ T6903] bridge0: port 1(bridge_slave_0) entered blocking state [ 192.664676][ T6903] bridge0: port 1(bridge_slave_0) entered forwarding state [ 192.870599][ T26] bridge0: port 1(bridge_slave_0) entered disabled state [ 192.892187][ T26] bridge0: port 2(bridge_slave_1) entered disabled state [ 192.947784][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 193.041317][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 193.128916][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 193.221279][ T26] bridge0: port 1(bridge_slave_0) entered blocking state [ 193.228165][ T26] bridge0: port 1(bridge_slave_0) entered forwarding state [ 193.251106][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 193.259166][ T26] bridge0: port 2(bridge_slave_1) entered blocking state [ 193.266039][ T26] bridge0: port 2(bridge_slave_1) entered forwarding state [ 193.418400][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 193.426617][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 193.434488][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 193.442444][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 193.490000][ T6966] device syzkaller0 entered promiscuous mode [ 193.497791][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 193.507963][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 193.533574][ T289] syz-executor (289) used greatest stack depth: 20512 bytes left [ 193.547167][ T6968] device pim6reg1 entered promiscuous mode [ 193.556022][ T6903] device veth0_vlan entered promiscuous mode [ 193.562580][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 193.572866][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 193.581460][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 193.588803][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 193.640683][ T6903] device veth1_macvtap entered promiscuous mode [ 193.667228][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 193.687764][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 193.696371][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 193.729394][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 193.742169][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 193.758219][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 193.770163][ T295] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 193.933512][ T333] device veth1_macvtap left promiscuous mode [ 194.402214][ T7004] device syzkaller0 entered promiscuous mode [ 194.564836][ T7015] device pim6reg1 entered promiscuous mode [ 195.377378][ T7054] device syzkaller0 entered promiscuous mode [ 195.967675][ T7074] device pim6reg1 entered promiscuous mode [ 196.036666][ T7077] device syzkaller0 entered promiscuous mode [ 196.255274][ T7094] device syzkaller0 entered promiscuous mode [ 196.387953][ T7105] device pim6reg1 entered promiscuous mode [ 196.793959][ T333] device bridge_slave_1 left promiscuous mode [ 196.807612][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 196.850364][ T333] device bridge_slave_0 left promiscuous mode [ 196.860393][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 196.892443][ T333] device veth1_macvtap left promiscuous mode [ 196.900743][ T333] device veth0_vlan left promiscuous mode [ 197.049260][ T7131] device syzkaller0 entered promiscuous mode [ 197.231550][ T7153] device pim6reg1 entered promiscuous mode [ 197.312964][ T7154] syz.1.2579[7154] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.313036][ T7154] syz.1.2579[7154] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.377859][ T7154] syz.1.2579[7154] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 197.464031][ T7154] syz.1.2579[7154] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.278613][ T7191] device pim6reg1 entered promiscuous mode [ 198.514529][ T7197] device syzkaller0 entered promiscuous mode [ 198.829033][ T7213] syz.3.2605[7213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.829112][ T7213] syz.3.2605[7213] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.911313][ T7219] syz.3.2605[7219] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 198.923134][ T7219] syz.3.2605[7219] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.036379][ T7229] syz.2.2612[7229] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.097916][ T7233] device pim6reg1 entered promiscuous mode [ 199.235608][ T7235] syz.2.2612[7235] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 199.863484][ T333] device bridge_slave_1 left promiscuous mode [ 199.891090][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 199.929403][ T333] device bridge_slave_0 left promiscuous mode [ 199.958572][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 199.975135][ T333] device veth1_macvtap left promiscuous mode [ 200.182439][ T7267] device syzkaller0 entered promiscuous mode [ 200.215073][ T7268] device syzkaller0 entered promiscuous mode [ 202.325247][ T7372] bpf_get_probe_write_proto: 14 callbacks suppressed [ 202.325273][ T7372] syz.3.2665[7372] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.381149][ T7377] syz.3.2665[7377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.398465][ T7372] syz.3.2665[7372] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.543738][ T7377] syz.3.2665[7377] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 202.863096][ T7398] device pim6reg1 entered promiscuous mode [ 204.443594][ T7485] device pim6reg1 entered promiscuous mode [ 204.601842][ T7499] device pim6reg1 entered promiscuous mode [ 204.954999][ T7522] device pim6reg1 entered promiscuous mode [ 205.158988][ T7539] device pim6reg1 entered promiscuous mode [ 205.461720][ T7561] syz.3.2746[7561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.461796][ T7561] syz.3.2746[7561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.503605][ T7561] syz.3.2746[7561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.561177][ T7561] syz.3.2746[7561] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 205.724669][ T7577] device pim6reg1 entered promiscuous mode [ 205.805299][ T7587] device wg2 entered promiscuous mode [ 206.247435][ T7610] device pim6reg1 entered promiscuous mode [ 206.390447][ T7615] device pim6reg1 entered promiscuous mode [ 206.836175][ T7659] device syzkaller0 entered promiscuous mode [ 207.200793][ T7687] syz.4.2802[7687] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.201687][ T7687] syz.4.2802[7687] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.511674][ T7708] device syzkaller0 entered promiscuous mode [ 207.589419][ T7717] device pim6reg1 entered promiscuous mode [ 207.786061][ T7729] bpf_get_probe_write_proto: 2 callbacks suppressed [ 207.786232][ T7729] syz.3.2819[7729] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.800024][ T7729] syz.3.2819[7729] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.823280][ T7738] syz.3.2819[7738] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.858909][ T7738] syz.3.2819[7738] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.972032][ T7753] device syzkaller0 entered promiscuous mode [ 208.414712][ T7779] syz.1.2843[7779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.414812][ T7779] syz.1.2843[7779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.574232][ T7785] syz.1.2843[7785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.765161][ T7785] syz.1.2843[7785] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.869350][ T7796] device syzkaller0 entered promiscuous mode [ 209.559750][ T7833] device syzkaller0 entered promiscuous mode [ 210.008501][ T7856] device pim6reg1 entered promiscuous mode [ 210.040471][ T7852] syz.3.2870[7852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 210.040621][ T7852] syz.3.2870[7852] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 211.036991][ T7903] device syzkaller0 entered promiscuous mode [ 211.290724][ T7922] device pim6reg1 entered promiscuous mode [ 211.339487][ T7926] device pim6reg1 entered promiscuous mode [ 211.352572][ T7934] device wg2 entered promiscuous mode [ 211.850344][ T7971] device pim6reg1 entered promiscuous mode [ 212.137196][ T7977] bridge0: port 1(bridge_slave_0) entered blocking state [ 212.197062][ T7977] bridge0: port 1(bridge_slave_0) entered disabled state [ 212.234317][ T7977] device bridge_slave_0 entered promiscuous mode [ 212.252584][ T7977] bridge0: port 2(bridge_slave_1) entered blocking state [ 212.261111][ T7977] bridge0: port 2(bridge_slave_1) entered disabled state [ 212.268723][ T7977] device bridge_slave_1 entered promiscuous mode [ 213.126755][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 213.134516][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 213.143542][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 213.152025][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 213.160097][ T539] bridge0: port 1(bridge_slave_0) entered blocking state [ 213.166991][ T539] bridge0: port 1(bridge_slave_0) entered forwarding state [ 213.174840][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 213.183144][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 213.191571][ T539] bridge0: port 2(bridge_slave_1) entered blocking state [ 213.198442][ T539] bridge0: port 2(bridge_slave_1) entered forwarding state [ 213.225910][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 213.233569][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 213.242456][ T539] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 213.267060][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 213.316367][ T7977] device veth0_vlan entered promiscuous mode [ 213.338860][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 213.386450][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 213.402087][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 213.511185][ T7977] device veth1_macvtap entered promiscuous mode [ 213.530014][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 213.549208][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 213.550616][ T8059] bpf_get_probe_write_proto: 6 callbacks suppressed [ 213.550637][ T8059] syz.3.2960[8059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.564128][ T8059] syz.3.2960[8059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.601063][ T8059] syz.3.2960[8059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.684284][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 213.728482][ T8059] syz.3.2960[8059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.752235][ T375] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 214.202886][ T333] device bridge_slave_1 left promiscuous mode [ 214.213573][ T333] bridge0: port 2(bridge_slave_1) entered disabled state [ 214.250990][ T333] device bridge_slave_0 left promiscuous mode [ 214.310685][ T333] bridge0: port 1(bridge_slave_0) entered disabled state [ 214.374811][ T333] device veth1_macvtap left promiscuous mode [ 214.391902][ T333] device veth0_vlan left promiscuous mode [ 214.660257][ T8091] device syzkaller0 entered promiscuous mode [ 214.987899][ T8113] syz.2.2978[8113] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.987980][ T8113] syz.2.2978[8113] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.095746][ T8119] syz.2.2978[8119] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.232324][ T8119] syz.2.2978[8119] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 215.322286][ T8126] device syzkaller0 entered promiscuous mode [ 215.854000][ T8166] device pim6reg1 entered promiscuous mode [ 215.934685][ T8168] device syzkaller0 entered promiscuous mode [ 216.185453][ T8187] syz.4.3010[8187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 216.185533][ T8187] syz.4.3010[8187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 217.014901][ T8226] device pim6reg1 entered promiscuous mode [ 217.361929][ T8241] device syzkaller0 entered promiscuous mode [ 217.851629][ T8269] device pim6reg1 entered promiscuous mode [ 218.358549][ T8311] device pim6reg1 entered promiscuous mode [ 218.435525][ T8314] device syzkaller0 entered promiscuous mode [ 218.689090][ T8339] device wg2 entered promiscuous mode [ 219.199801][ T8352] device syzkaller0 entered promiscuous mode [ 219.805512][ T8384] bpf_get_probe_write_proto: 6 callbacks suppressed [ 219.805532][ T8384] syz.0.3090[8384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.812873][ T8384] syz.0.3090[8384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.852405][ T8384] syz.0.3090[8384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 219.990502][ T8384] syz.0.3090[8384] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 220.858871][ T8421] device syzkaller0 entered promiscuous mode [ 220.990041][ T8428] device pim6reg1 entered promiscuous mode [ 221.106101][ T8442] syz.2.3112[8442] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.106178][ T8442] syz.2.3112[8442] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.162329][ T8444] syz.2.3112[8444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.432495][ T8444] syz.2.3112[8444] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.183027][ T8463] device syzkaller0 entered promiscuous mode [ 222.220071][ T8475] device pim6reg1 entered promiscuous mode [ 223.336754][ T8507] device syzkaller0 entered promiscuous mode [ 223.356207][ T8516] device pim6reg1 entered promiscuous mode [ 223.538943][ T8529] device pim6reg1 entered promiscuous mode [ 223.898442][ T8547] syz.3.3154[8547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 223.898518][ T8547] syz.3.3154[8547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.841038][ T8600] device pim6reg1 entered promiscuous mode [ 225.084273][ T8607] bpf_get_probe_write_proto: 2 callbacks suppressed [ 225.084302][ T8607] syz.2.3180[8607] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.196476][ T8611] syz.2.3180[8611] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.744153][ T8632] device pim6reg1 entered promiscuous mode [ 225.877782][ T8651] device pim6reg1 entered promiscuous mode [ 225.887638][ T8653] syz.1.3197[8653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.887712][ T8653] syz.1.3197[8653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.913301][ T8653] syz.1.3197[8653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.926005][ T8653] syz.1.3197[8653] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.120359][ T8664] syz.4.3201[8664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.226708][ T8673] syz.4.3201[8673] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.231673][ T8671] syz.2.3207[8671] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.271957][ T8664] syz.4.3201[8664] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 226.508422][ T8679] device pim6reg1 entered promiscuous mode [ 226.929045][ T8697] device pim6reg1 entered promiscuous mode [ 226.965444][ T8707] device pim6reg1 entered promiscuous mode [ 227.970559][ T8751] device pim6reg1 entered promiscuous mode [ 228.124290][ T8753] device pim6reg1 entered promiscuous mode [ 228.941294][ T8788] device pim6reg1 entered promiscuous mode [ 229.464606][ T8824] device pim6reg1 entered promiscuous mode [ 229.812338][ T8841] device syzkaller0 entered promiscuous mode [ 229.819136][ T8837] device pim6reg1 entered promiscuous mode [ 230.186538][ T8849] device pim6reg1 entered promiscuous mode [ 230.269960][ T8857] bpf_get_probe_write_proto: 22 callbacks suppressed [ 230.269979][ T8857] syz.0.3281[8857] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.276933][ T8857] syz.0.3281[8857] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.289029][ T8857] syz.0.3281[8857] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.300272][ T8857] syz.0.3281[8857] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.343732][ T8861] device pim6reg1 entered promiscuous mode [ 230.460711][ T8877] syz.4.3288[8877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.460789][ T8877] syz.4.3288[8877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.482119][ T8872] device syzkaller0 entered promiscuous mode [ 230.631470][ T8884] syz.3.3292[8884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.631551][ T8884] syz.3.3292[8884] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.652561][ T8877] syz.4.3288[8877] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.661423][ T8886] syz.2.3291[8886] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 231.228295][ T8910] device pim6reg1 entered promiscuous mode [ 231.523672][ T8924] device syzkaller0 entered promiscuous mode [ 231.562806][ T8926] device pim6reg1 entered promiscuous mode [ 231.815108][ T8948] device pim6reg1 entered promiscuous mode [ 231.837059][ T8945] device pim6reg1 entered promiscuous mode [ 232.431036][ T8982] device pim6reg1 entered promiscuous mode [ 232.583035][ T8998] device syzkaller0 entered promiscuous mode [ 232.873463][ T9023] device wg2 entered promiscuous mode [ 233.264503][ T9032] device pim6reg1 entered promiscuous mode [ 233.765674][ T9062] device syzkaller0 entered promiscuous mode [ 234.719711][ T9121] device syzkaller0 entered promiscuous mode [ 235.722940][ T9168] device syzkaller0 entered promiscuous mode [ 235.874192][ T9187] bpf_get_probe_write_proto: 42 callbacks suppressed [ 235.874215][ T9187] syz.2.3414[9187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.890339][ T9187] syz.2.3414[9187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.903150][ T9187] syz.2.3414[9187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 235.914767][ T9187] syz.2.3414[9187] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 236.161971][ T9212] device pim6reg1 entered promiscuous mode [ 236.740699][ T9244] device pim6reg1 entered promiscuous mode [ 237.223564][ T9275] device syzkaller0 entered promiscuous mode [ 237.414712][ T9286] device pim6reg1 entered promiscuous mode [ 237.537640][ T9294] syz.0.3457[9294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.537729][ T9294] syz.0.3457[9294] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.657467][ T9300] syz.0.3457[9300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.684120][ T9300] syz.0.3457[9300] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 237.735923][ T9307] device syzkaller0 entered promiscuous mode [ 237.854533][ T9322] device pim6reg1 entered promiscuous mode [ 238.188225][ T9341] syz.2.3477[9341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.188300][ T9341] syz.2.3477[9341] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 238.470587][ T9347] device syzkaller0 entered promiscuous mode [ 239.065222][ T9372] device pim6reg1 entered promiscuous mode [ 240.678207][ T9446] device pim6reg1 entered promiscuous mode [ 240.866815][ T9456] device syzkaller0 entered promiscuous mode [ 240.884063][ T9460] device pim6reg1 entered promiscuous mode [ 241.034094][ T9482] device pim6reg1 entered promiscuous mode [ 241.178357][ T9496] device syzkaller0 entered promiscuous mode [ 241.704047][ T9530] device syzkaller0 entered promiscuous mode [ 241.965531][ T9547] bpf_get_probe_write_proto: 12 callbacks suppressed [ 241.965552][ T9547] syz.2.3562[9547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.974946][ T9547] syz.2.3562[9547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 241.988906][ T9547] syz.2.3562[9547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.002440][ T9547] syz.2.3562[9547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 242.903469][ T9604] device syzkaller0 entered promiscuous mode [ 243.061015][ T9624] syz.0.3591[9624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.061205][ T9624] syz.0.3591[9624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.290196][ T9624] syz.0.3591[9624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.309739][ T9624] syz.0.3591[9624] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.328695][ T9631] device pim6reg1 entered promiscuous mode [ 243.562269][ T9642] syz.2.3600[9642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 243.562346][ T9642] syz.2.3600[9642] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 244.066733][ T9654] device syzkaller0 entered promiscuous mode [ 244.325032][ T9666] device pim6reg1 entered promiscuous mode [ 244.551434][ T9686] device syzkaller0 entered promiscuous mode [ 245.634221][ T9751] device pim6reg1 entered promiscuous mode [ 245.942426][ T9759] device syzkaller0 entered promiscuous mode [ 247.132589][ T9824] bpf_get_probe_write_proto: 10 callbacks suppressed [ 247.132610][ T9824] syz.0.3676[9824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.148898][ T9824] syz.0.3676[9824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.229740][ T9824] syz.0.3676[9824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.279656][ T9838] device pim6reg1 entered promiscuous mode [ 247.299710][ T9824] syz.0.3676[9824] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 247.423676][ T9847] device pim6reg1 entered promiscuous mode [ 247.705616][ T9882] device pim6reg1 entered promiscuous mode [ 247.747930][ T9885] device pim6reg1 entered promiscuous mode [ 248.098393][ T9921] device pim6reg1 entered promiscuous mode [ 248.448835][ T9954] device pim6reg1 entered promiscuous mode [ 249.154524][ T9983] device pim6reg1 entered promiscuous mode [ 249.734966][T10036] device pim6reg1 entered promiscuous mode [ 250.266009][T10073] device pim6reg1 entered promiscuous mode [ 250.855985][T10118] device pim6reg1 entered promiscuous mode [ 251.270811][T10141] syz.4.3816[10141] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.276801][T10141] syz.4.3816[10141] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.317186][T10145] device pim6reg1 entered promiscuous mode [ 251.352528][T10148] syz.4.3816[10148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.352605][T10148] syz.4.3816[10148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 251.543234][T10154] device pim6reg1 entered promiscuous mode [ 252.064397][T10182] device pim6reg1 entered promiscuous mode [ 252.136722][T10187] device pim6reg1 entered promiscuous mode [ 252.157968][T10185] syz.4.3832[10185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.158047][T10185] syz.4.3832[10185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.222538][T10185] syz.4.3832[10185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.234175][T10185] syz.4.3832[10185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.540441][T10218] device pim6reg1 entered promiscuous mode [ 252.680125][T10228] device pim6reg1 entered promiscuous mode [ 252.967863][T10251] device pim6reg1 entered promiscuous mode [ 253.103196][T10264] device pim6reg1 entered promiscuous mode [ 253.300390][T10278] syz.1.3873[10278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.300466][T10278] syz.1.3873[10278] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.415990][T10288] syz.1.3873[10288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.493487][T10288] syz.1.3873[10288] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.614472][T10301] device pim6reg1 entered promiscuous mode [ 253.792668][T10309] device pim6reg1 entered promiscuous mode [ 253.916132][T10318] device syzkaller0 entered promiscuous mode [ 254.636020][T10355] device pim6reg1 entered promiscuous mode [ 254.690188][T10357] device pim6reg1 entered promiscuous mode [ 254.734763][T10363] device syzkaller0 entered promiscuous mode [ 255.274151][T10390] device pim6reg1 entered promiscuous mode [ 255.416881][T10394] device pim6reg1 entered promiscuous mode [ 255.812171][T10402] device syzkaller0 entered promiscuous mode [ 255.827829][T10417] syz.2.3930[10417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 255.832019][T10417] syz.2.3930[10417] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 256.075620][T10427] device pim6reg1 entered promiscuous mode [ 256.839713][T10451] device syzkaller0 entered promiscuous mode [ 256.900818][T10461] device pim6reg1 entered promiscuous mode [ 257.034613][T10472] device pim6reg1 entered promiscuous mode [ 257.197303][T10480] bpf_get_probe_write_proto: 8 callbacks suppressed [ 257.197386][T10480] syz.1.3956[10480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.207732][T10480] syz.1.3956[10480] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 257.447784][T10493] device pim6reg1 entered promiscuous mode [ 257.719180][T10499] device syzkaller0 entered promiscuous mode [ 258.115031][T10510] device pim6reg1 entered promiscuous mode [ 258.213250][T10512] syz.4.3969[10512] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.216498][T10512] syz.4.3969[10512] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.310445][T10512] syz.4.3969[10512] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.330250][T10512] syz.4.3969[10512] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.891673][T10547] syz.1.3982[10547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 258.940156][T10547] syz.1.3982[10547] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.026405][T10550] syz.1.3982[10550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.160902][T10550] syz.1.3982[10550] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.948667][T10592] device pim6reg1 entered promiscuous mode [ 260.379697][T10610] device pim6reg1 entered promiscuous mode [ 260.889534][T10634] device pim6reg1 entered promiscuous mode [ 261.093536][T10648] device pim6reg1 entered promiscuous mode [ 261.151121][T10636] bridge0: port 1(bridge_slave_0) entered blocking state [ 261.159680][T10636] bridge0: port 1(bridge_slave_0) entered disabled state [ 261.167515][T10636] device bridge_slave_0 entered promiscuous mode [ 261.224478][T10636] bridge0: port 2(bridge_slave_1) entered blocking state [ 261.284063][T10636] bridge0: port 2(bridge_slave_1) entered disabled state [ 261.343675][T10636] device bridge_slave_1 entered promiscuous mode [ 261.729306][T10678] device pim6reg1 entered promiscuous mode [ 262.265255][T10695] bpf_get_probe_write_proto: 16 callbacks suppressed [ 262.266495][T10695] syz.4.4035[10695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.341677][T10695] syz.4.4035[10695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.385373][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 262.440553][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 262.444040][T10695] syz.4.4035[10695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.452518][T10695] syz.4.4035[10695] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 262.522815][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 262.575139][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 262.593343][ T632] bridge0: port 1(bridge_slave_0) entered blocking state [ 262.600239][ T632] bridge0: port 1(bridge_slave_0) entered forwarding state [ 262.612209][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 262.622109][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 262.642357][ T632] bridge0: port 2(bridge_slave_1) entered blocking state [ 262.649249][ T632] bridge0: port 2(bridge_slave_1) entered forwarding state [ 262.658991][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 262.719081][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 262.835635][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 262.892344][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 262.900693][ T377] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 262.987852][T10636] device veth0_vlan entered promiscuous mode [ 263.006294][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 263.032657][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 263.121305][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 263.140794][ T632] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 263.234199][T10636] device veth1_macvtap entered promiscuous mode [ 263.240456][T10730] syz.3.4049[10730] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.240530][T10730] syz.3.4049[10730] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.342126][T10732] syz.3.4049[10732] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.456790][T10733] syz.0.4050[10733] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.456813][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 263.457161][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 263.495406][T10733] syz.0.4050[10733] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.496422][T10733] syz.0.4050[10733] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 263.645623][ T338] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 263.791161][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 263.809585][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 263.864114][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 263.903539][ T374] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 263.942500][T10745] device pim6reg1 entered promiscuous mode [ 264.725745][T10784] device pim6reg1 entered promiscuous mode [ 264.910376][ T45] device bridge_slave_1 left promiscuous mode [ 264.932809][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 264.946342][ T45] device bridge_slave_0 left promiscuous mode [ 264.992112][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 265.045601][ T45] device veth1_macvtap left promiscuous mode [ 265.083531][ T45] device veth0_vlan left promiscuous mode [ 265.568631][T10808] device pim6reg1 entered promiscuous mode [ 265.814371][T10825] device pim6reg1 entered promiscuous mode [ 266.410969][T10847] device pim6reg1 entered promiscuous mode [ 266.732419][T10868] device pim6reg1 entered promiscuous mode [ 266.968646][T10881] device pim6reg1 entered promiscuous mode [ 267.362726][T10896] bpf_get_probe_write_proto: 22 callbacks suppressed [ 267.362792][T10896] syz.2.4117[10896] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.440784][T10896] syz.2.4117[10896] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.541554][T10903] syz.2.4117[10903] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.630563][T10903] syz.2.4117[10903] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 267.776030][T10913] device pim6reg1 entered promiscuous mode [ 268.067395][T10926] device pim6reg1 entered promiscuous mode [ 270.240496][T11015] device pim6reg1 entered promiscuous mode [ 271.969166][T11115] syz.0.4207[11115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 271.983236][T11115] syz.0.4207[11115] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.051250][T11116] syz.0.4207[11116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.090630][T11116] syz.0.4207[11116] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.155311][T11123] device pim6reg1 entered promiscuous mode [ 272.793681][T11148] syz.1.4219[11148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.793771][T11148] syz.1.4219[11148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 272.894891][T11148] syz.1.4219[11148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.002350][T11148] syz.1.4219[11148] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 273.331629][T11167] device pim6reg1 entered promiscuous mode [ 274.233127][T11192] syz.2.4236[11192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.235367][T11192] syz.2.4236[11192] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.281812][T11198] syz.2.4236[11198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.296897][T11198] syz.2.4236[11198] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 274.344475][T11203] device wg2 entered promiscuous mode [ 274.373406][T11207] device pim6reg1 entered promiscuous mode [ 275.276951][T11232] syz.0.4252[11232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.278833][T11232] syz.0.4252[11232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 275.391911][T11241] device pim6reg1 entered promiscuous mode [ 276.345570][T11297] device pim6reg1 entered promiscuous mode [ 276.529867][T11312] device pim6reg1 entered promiscuous mode [ 276.823244][T11327] device pim6reg1 entered promiscuous mode [ 277.142201][T11334] device syzkaller0 entered promiscuous mode [ 277.518192][T11365] device pim6reg1 entered promiscuous mode [ 277.801081][T11376] device syzkaller0 entered promiscuous mode [ 278.347390][T11405] device pim6reg1 entered promiscuous mode [ 278.997480][T11439] device pim6reg1 entered promiscuous mode [ 279.498812][T11459] device pim6reg1 entered promiscuous mode [ 280.902405][T11512] bpf_get_probe_write_proto: 18 callbacks suppressed [ 280.902440][T11512] syz.1.4368[11512] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.912752][T11512] syz.1.4368[11512] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 280.978092][T11512] syz.1.4368[11512] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 281.056161][T11512] syz.1.4368[11512] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.115071][T11554] syz.4.4384[11554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.133812][T11559] syz.4.4384[11559] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.134908][T11554] syz.4.4384[11554] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.182137][T11559] syz.4.4384[11559] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 282.915604][T11595] syz.2.4401[11595] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 283.053399][T11595] syz.2.4401[11595] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.189004][T11631] device pim6reg1 entered promiscuous mode [ 285.671977][T11699] device pim6reg1 entered promiscuous mode [ 286.580035][T11732] device pim6reg1 entered promiscuous mode [ 286.852414][T11739] device pim6reg1 entered promiscuous mode [ 287.279426][T11755] bpf_get_probe_write_proto: 10 callbacks suppressed [ 287.279445][T11755] syz.4.4460[11755] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.331292][T11758] syz.4.4460[11758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.447176][T11758] syz.4.4460[11758] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 287.537710][T11767] device pim6reg1 entered promiscuous mode [ 288.030688][T11777] device pim6reg1 entered promiscuous mode [ 288.058112][T11780] device syzkaller0 entered promiscuous mode [ 288.583744][T11804] device pim6reg1 entered promiscuous mode [ 289.448500][T11843] device pim6reg1 entered promiscuous mode [ 289.596835][T11853] device syzkaller0 entered promiscuous mode [ 289.902561][T11866] syz.3.4506[11866] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.902656][T11866] syz.3.4506[11866] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.023500][T11869] device pim6reg1 entered promiscuous mode [ 290.103006][T11866] syz.3.4506[11866] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.103084][T11866] syz.3.4506[11866] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 290.725394][T11888] device pim6reg1 entered promiscuous mode [ 290.922098][T11894] device syzkaller0 entered promiscuous mode [ 291.541380][T11915] syz.4.4523[11915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.541456][T11915] syz.4.4523[11915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 291.791763][T11915] syz.4.4523[11915] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 292.462808][T11956] device pim6reg1 entered promiscuous mode [ 293.269129][T11982] bpf_get_probe_write_proto: 1 callbacks suppressed [ 293.269148][T11982] syz.2.4548[11982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.294925][T11982] syz.2.4548[11982] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.349531][T11987] syz.2.4548[11987] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.539246][T11991] device syzkaller0 entered promiscuous mode [ 293.746299][T12000] device pim6reg1 entered promiscuous mode [ 294.466562][T12030] device syzkaller0 entered promiscuous mode [ 294.786631][T12054] syz.0.4575[12054] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.786706][T12054] syz.0.4575[12054] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.891060][T12054] syz.0.4575[12054] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.893070][T12057] syz.2.4576[12057] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 294.953837][T12054] syz.0.4575[12054] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.000865][T12059] syz.2.4576[12059] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.083096][T12057] syz.2.4576[12057] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 295.695556][T12087] device syzkaller0 entered promiscuous mode [ 297.017778][T12133] device pim6reg1 entered promiscuous mode [ 298.257315][T12168] device pim6reg1 entered promiscuous mode [ 298.433244][T12180] device pim6reg1 entered promiscuous mode [ 298.436009][T12183] bpf_get_probe_write_proto: 5 callbacks suppressed [ 298.436056][T12183] syz.4.4622[12183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.452929][T12183] syz.4.4622[12183] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.476003][T12193] syz.4.4622[12193] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 298.551096][T12193] syz.4.4622[12193] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.181411][T12212] device pim6reg1 entered promiscuous mode [ 300.041663][T12252] device pim6reg1 entered promiscuous mode [ 301.344094][T12302] device pim6reg1 entered promiscuous mode [ 302.141727][T12334] device pim6reg1 entered promiscuous mode [ 302.776383][T12368] device pim6reg1 entered promiscuous mode [ 303.369070][T12395] device pim6reg1 entered promiscuous mode [ 303.700642][T12411] device pim6reg1 entered promiscuous mode [ 304.701093][T12434] FAULT_INJECTION: forcing a failure. [ 304.701093][T12434] name failslab, interval 1, probability 0, space 0, times 0 [ 304.826336][T12434] CPU: 1 PID: 12434 Comm: syz.4.4717 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 304.836166][T12434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 304.846059][T12434] Call Trace: [ 304.849182][T12434] [ 304.851975][T12434] dump_stack_lvl+0x151/0x1b7 [ 304.856470][T12434] ? io_uring_drop_tctx_refs+0x190/0x190 [ 304.861944][T12434] dump_stack+0x15/0x17 [ 304.865929][T12434] should_fail+0x3c6/0x510 [ 304.870183][T12434] __should_failslab+0xa4/0xe0 [ 304.874785][T12434] should_failslab+0x9/0x20 [ 304.879125][T12434] slab_pre_alloc_hook+0x37/0xd0 [ 304.883896][T12434] kmem_cache_alloc_trace+0x48/0x210 [ 304.889015][T12434] ? __get_vm_area_node+0x117/0x360 [ 304.894052][T12434] ? do_sys_openat2+0x71c/0x830 [ 304.898738][T12434] __get_vm_area_node+0x117/0x360 [ 304.903601][T12434] __vmalloc_node_range+0xe2/0x8d0 [ 304.908550][T12434] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 304.913927][T12434] ? selinux_capset+0xf0/0xf0 [ 304.918439][T12434] ? kstrtouint_from_user+0x20a/0x2a0 [ 304.923651][T12434] ? kstrtol_from_user+0x310/0x310 [ 304.928593][T12434] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 304.933974][T12434] __vmalloc+0x7a/0x90 [ 304.937879][T12434] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 304.943260][T12434] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 304.948465][T12434] ? bpf_prog_alloc+0x15/0x1e0 [ 304.953069][T12434] bpf_prog_alloc+0x1f/0x1e0 [ 304.957493][T12434] bpf_prog_load+0x800/0x1b50 [ 304.962012][T12434] ? map_freeze+0x370/0x370 [ 304.966349][T12434] ? selinux_bpf+0xcb/0x100 [ 304.970687][T12434] ? security_bpf+0x82/0xb0 [ 304.975029][T12434] __sys_bpf+0x4bc/0x760 [ 304.979105][T12434] ? fput_many+0x160/0x1b0 [ 304.983360][T12434] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 304.988571][T12434] ? debug_smp_processor_id+0x17/0x20 [ 304.993772][T12434] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 304.999674][T12434] __x64_sys_bpf+0x7c/0x90 [ 305.003927][T12434] do_syscall_64+0x3d/0xb0 [ 305.008179][T12434] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 305.013908][T12434] RIP: 0033:0x7f294ba85f19 [ 305.018161][T12434] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 305.037604][T12434] RSP: 002b:00007f294ad07048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 305.045847][T12434] RAX: ffffffffffffffda RBX: 00007f294bc15f60 RCX: 00007f294ba85f19 [ 305.053658][T12434] RDX: 0000000000000048 RSI: 00000000200017c0 RDI: 0000000000000005 [ 305.061472][T12434] RBP: 00007f294ad070a0 R08: 0000000000000000 R09: 0000000000000000 [ 305.069284][T12434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 305.077093][T12434] R13: 000000000000000b R14: 00007f294bc15f60 R15: 00007fff37eb2228 [ 305.084909][T12434] [ 305.102239][T12434] syz.4.4717: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz4,mems_allowed=0 [ 305.121176][T12434] CPU: 0 PID: 12434 Comm: syz.4.4717 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 305.130989][T12434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 305.140883][T12434] Call Trace: [ 305.144004][T12434] [ 305.146870][T12434] dump_stack_lvl+0x151/0x1b7 [ 305.151402][T12434] ? io_uring_drop_tctx_refs+0x190/0x190 [ 305.156853][T12434] ? pr_cont_kernfs_name+0xf0/0x100 [ 305.161885][T12434] dump_stack+0x15/0x17 [ 305.165874][T12434] warn_alloc+0x21a/0x390 [ 305.170041][T12434] ? zone_watermark_ok_safe+0x270/0x270 [ 305.175422][T12434] ? kmem_cache_alloc_trace+0x115/0x210 [ 305.180803][T12434] ? __get_vm_area_node+0x117/0x360 [ 305.185837][T12434] ? __get_vm_area_node+0x347/0x360 [ 305.190872][T12434] __vmalloc_node_range+0x2c1/0x8d0 [ 305.195905][T12434] ? selinux_capset+0xf0/0xf0 [ 305.200416][T12434] ? kstrtouint_from_user+0x20a/0x2a0 [ 305.205627][T12434] ? kstrtol_from_user+0x310/0x310 [ 305.210572][T12434] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 305.215953][T12434] __vmalloc+0x7a/0x90 [ 305.219860][T12434] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 305.225243][T12434] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 305.230446][T12434] ? bpf_prog_alloc+0x15/0x1e0 [ 305.235047][T12434] bpf_prog_alloc+0x1f/0x1e0 [ 305.239473][T12434] bpf_prog_load+0x800/0x1b50 [ 305.243992][T12434] ? map_freeze+0x370/0x370 [ 305.248330][T12434] ? selinux_bpf+0xcb/0x100 [ 305.252669][T12434] ? security_bpf+0x82/0xb0 [ 305.257015][T12434] __sys_bpf+0x4bc/0x760 [ 305.261085][T12434] ? fput_many+0x160/0x1b0 [ 305.265338][T12434] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 305.270545][T12434] ? debug_smp_processor_id+0x17/0x20 [ 305.275753][T12434] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 305.281655][T12434] __x64_sys_bpf+0x7c/0x90 [ 305.285908][T12434] do_syscall_64+0x3d/0xb0 [ 305.290159][T12434] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 305.295891][T12434] RIP: 0033:0x7f294ba85f19 [ 305.300145][T12434] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 305.319843][T12434] RSP: 002b:00007f294ad07048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 305.328088][T12434] RAX: ffffffffffffffda RBX: 00007f294bc15f60 RCX: 00007f294ba85f19 [ 305.335899][T12434] RDX: 0000000000000048 RSI: 00000000200017c0 RDI: 0000000000000005 [ 305.343797][T12434] RBP: 00007f294ad070a0 R08: 0000000000000000 R09: 0000000000000000 [ 305.351695][T12434] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 305.359506][T12434] R13: 000000000000000b R14: 00007f294bc15f60 R15: 00007fff37eb2228 [ 305.367323][T12434] [ 305.386603][T12434] Mem-Info: [ 305.389593][T12434] active_anon:96 inactive_anon:2977 isolated_anon:0 [ 305.389593][T12434] active_file:19343 inactive_file:3306 isolated_file:0 [ 305.389593][T12434] unevictable:0 dirty:248 writeback:0 [ 305.389593][T12434] slab_reclaimable:6791 slab_unreclaimable:73254 [ 305.389593][T12434] mapped:13968 shmem:159 pagetables:460 bounce:0 [ 305.389593][T12434] kernel_misc_reclaimable:0 [ 305.389593][T12434] free:1546551 free_pcp:26162 free_cma:0 [ 305.432848][T12434] Node 0 active_anon:384kB inactive_anon:12008kB active_file:77372kB inactive_file:13224kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:55872kB dirty:992kB writeback:0kB shmem:636kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4328kB pagetables:1840kB all_unreclaimable? no [ 305.463788][T12434] DMA32 free:2976724kB min:62592kB low:78240kB high:93888kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2981396kB mlocked:0kB bounce:0kB free_pcp:4672kB local_pcp:56kB free_cma:0kB [ 305.491508][T12434] lowmem_reserve[]: 0 3941 3941 [ 305.496267][T12434] Normal free:3137408kB min:84860kB low:106072kB high:127284kB reserved_highatomic:0KB active_anon:384kB inactive_anon:12008kB active_file:77372kB inactive_file:13224kB unevictable:0kB writepending:992kB present:5242880kB managed:4035840kB mlocked:0kB bounce:0kB free_pcp:100056kB local_pcp:48764kB free_cma:0kB [ 305.525562][T12434] lowmem_reserve[]: 0 0 0 [ 305.530024][T12434] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 4*2048kB (UM) 723*4096kB (M) = 2976724kB [ 305.546148][T12434] Normal: 1280*4kB (UME) 497*8kB (ME) 322*16kB (ME) 216*32kB (ME) 280*64kB (UME) 98*128kB (ME) 46*256kB (UME) 14*512kB (UME) 5*1024kB (UME) 2*2048kB (ME) 738*4096kB (M) = 3102632kB [ 305.566288][T12434] 22808 total pagecache pages [ 305.570999][T12434] 0 pages in swap cache [ 305.586778][T12434] Swap cache stats: add 0, delete 0, find 0/0 [ 305.633908][T12434] Free swap = 124996kB [ 305.678906][T12446] device pim6reg1 entered promiscuous mode [ 305.681026][T12434] Total swap = 124996kB [ 305.688682][T12434] 2097051 pages RAM [ 305.693660][T12434] 0 pages HighMem/MovableOnly [ 305.698151][T12434] 342742 pages reserved [ 305.702240][T12434] 0 pages cma reserved [ 305.712920][T12451] device pim6reg1 entered promiscuous mode [ 306.803263][T12482] device syzkaller0 entered promiscuous mode [ 307.365161][T12498] device pim6reg1 entered promiscuous mode [ 307.433060][T12500] device pim6reg1 entered promiscuous mode [ 308.468967][T12537] device pim6reg1 entered promiscuous mode [ 308.651898][T12545] FAULT_INJECTION: forcing a failure. [ 308.651898][T12545] name failslab, interval 1, probability 0, space 0, times 0 [ 308.684801][T12545] CPU: 1 PID: 12545 Comm: syz.4.4757 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 308.694654][T12545] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 308.704546][T12545] Call Trace: [ 308.707670][T12545] [ 308.710448][T12545] dump_stack_lvl+0x151/0x1b7 [ 308.714960][T12545] ? io_uring_drop_tctx_refs+0x190/0x190 [ 308.720428][T12545] ? __kasan_slab_alloc+0x63/0xe0 [ 308.725378][T12545] dump_stack+0x15/0x17 [ 308.729364][T12545] should_fail+0x3c6/0x510 [ 308.733629][T12545] __should_failslab+0xa4/0xe0 [ 308.738238][T12545] should_failslab+0x9/0x20 [ 308.742556][T12545] slab_pre_alloc_hook+0x37/0xd0 [ 308.747334][T12545] kmem_cache_alloc_trace+0x48/0x210 [ 308.752454][T12545] ? __get_vm_area_node+0x117/0x360 [ 308.757490][T12545] __get_vm_area_node+0x117/0x360 [ 308.762348][T12545] __vmalloc_node_range+0xe2/0x8d0 [ 308.767292][T12545] ? dev_map_alloc+0x35f/0x790 [ 308.771899][T12545] bpf_map_area_alloc+0xd9/0xf0 [ 308.776687][T12545] ? dev_map_alloc+0x35f/0x790 [ 308.781275][T12545] dev_map_alloc+0x35f/0x790 [ 308.785694][T12545] map_create+0x411/0x2050 [ 308.789948][T12545] __sys_bpf+0x296/0x760 [ 308.794026][T12545] ? fput_many+0x160/0x1b0 [ 308.798281][T12545] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 308.803490][T12545] ? debug_smp_processor_id+0x17/0x20 [ 308.808696][T12545] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 308.814610][T12545] __x64_sys_bpf+0x7c/0x90 [ 308.818848][T12545] do_syscall_64+0x3d/0xb0 [ 308.823099][T12545] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 308.828833][T12545] RIP: 0033:0x7f294ba85f19 [ 308.833084][T12545] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 308.852525][T12545] RSP: 002b:00007f294ad07048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 308.860767][T12545] RAX: ffffffffffffffda RBX: 00007f294bc15f60 RCX: 00007f294ba85f19 [ 308.868580][T12545] RDX: 0000000000000048 RSI: 0000000020000580 RDI: 0600000000000000 [ 308.876395][T12545] RBP: 00007f294ad070a0 R08: 0000000000000000 R09: 0000000000000000 [ 308.884376][T12545] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 308.892185][T12545] R13: 000000000000000b R14: 00007f294bc15f60 R15: 00007fff37eb2228 [ 308.900003][T12545] [ 308.940804][T12533] device syzkaller0 entered promiscuous mode [ 308.981329][T12548] FAULT_INJECTION: forcing a failure. [ 308.981329][T12548] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 309.014294][T12552] device pim6reg1 entered promiscuous mode [ 309.030931][T12548] CPU: 1 PID: 12548 Comm: syz.1.4758 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 309.040859][T12548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 309.050759][T12548] Call Trace: [ 309.053876][T12548] [ 309.056659][T12548] dump_stack_lvl+0x151/0x1b7 [ 309.061169][T12548] ? io_uring_drop_tctx_refs+0x190/0x190 [ 309.066636][T12548] ? __kasan_check_write+0x14/0x20 [ 309.071581][T12548] ? __alloc_skb+0x355/0x550 [ 309.076009][T12548] dump_stack+0x15/0x17 [ 309.079998][T12548] should_fail+0x3c6/0x510 [ 309.084251][T12548] should_fail_usercopy+0x1a/0x20 [ 309.089126][T12548] _copy_from_iter+0x22f/0xdc0 [ 309.093713][T12548] ? copy_mc_pipe_to_iter+0x760/0x760 [ 309.098922][T12548] ? __check_object_size+0x2ec/0x3d0 [ 309.104040][T12548] skb_copy_datagram_from_iter+0x100/0x6d0 [ 309.109686][T12548] tun_get_user+0x112d/0x3aa0 [ 309.114194][T12548] ? kasan_set_track+0x4b/0x70 [ 309.118792][T12548] ? kasan_set_free_info+0x23/0x40 [ 309.123746][T12548] ? _kstrtoull+0x3a0/0x4a0 [ 309.128081][T12548] ? tun_do_read+0x1ef0/0x1ef0 [ 309.132681][T12548] ? kstrtouint_from_user+0x20a/0x2a0 [ 309.137889][T12548] ? kstrtol_from_user+0x310/0x310 [ 309.142848][T12548] ? avc_policy_seqno+0x1b/0x70 [ 309.147525][T12548] ? selinux_file_permission+0x2c4/0x570 [ 309.152990][T12548] tun_chr_write_iter+0x1e1/0x2e0 [ 309.157852][T12548] vfs_write+0xd5d/0x1110 [ 309.162018][T12548] ? kmem_cache_free+0x2c3/0x2e0 [ 309.166794][T12548] ? file_end_write+0x1c0/0x1c0 [ 309.171480][T12548] ? __fdget_pos+0x209/0x3a0 [ 309.175992][T12548] ? ksys_write+0x77/0x2c0 [ 309.180244][T12548] ksys_write+0x199/0x2c0 [ 309.184411][T12548] ? __ia32_sys_read+0x90/0x90 [ 309.189008][T12548] ? debug_smp_processor_id+0x17/0x20 [ 309.194215][T12548] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 309.200121][T12548] __x64_sys_write+0x7b/0x90 [ 309.204549][T12548] do_syscall_64+0x3d/0xb0 [ 309.208797][T12548] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 309.214528][T12548] RIP: 0033:0x7f5aa8b55f19 [ 309.218783][T12548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 309.238306][T12548] RSP: 002b:00007f5aa7dd7048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 309.246555][T12548] RAX: ffffffffffffffda RBX: 00007f5aa8ce5f60 RCX: 00007f5aa8b55f19 [ 309.254364][T12548] RDX: 000000000000fdef RSI: 0000000020000300 RDI: 00000000000000c8 [ 309.262174][T12548] RBP: 00007f5aa7dd70a0 R08: 0000000000000000 R09: 0000000000000000 [ 309.269989][T12548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 309.277796][T12548] R13: 000000000000000b R14: 00007f5aa8ce5f60 R15: 00007fff2136e7e8 [ 309.285733][T12548] [ 309.807996][T12576] device pim6reg1 entered promiscuous mode [ 309.933775][T12578] FAULT_INJECTION: forcing a failure. [ 309.933775][T12578] name failslab, interval 1, probability 0, space 0, times 0 [ 310.290984][ T30] audit: type=1400 audit(1721705447.003:139): avc: denied { create } for pid=12582 comm="syz.0.4773" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 310.320882][T12578] CPU: 0 PID: 12578 Comm: syz.1.4771 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 310.330699][T12578] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 310.340607][T12578] Call Trace: [ 310.343714][T12578] [ 310.346492][T12578] dump_stack_lvl+0x151/0x1b7 [ 310.351006][T12578] ? io_uring_drop_tctx_refs+0x190/0x190 [ 310.356476][T12578] dump_stack+0x15/0x17 [ 310.360470][T12578] should_fail+0x3c6/0x510 [ 310.364722][T12578] __should_failslab+0xa4/0xe0 [ 310.369319][T12578] should_failslab+0x9/0x20 [ 310.373659][T12578] slab_pre_alloc_hook+0x37/0xd0 [ 310.378432][T12578] kmem_cache_alloc_trace+0x48/0x210 [ 310.383553][T12578] ? __get_vm_area_node+0x117/0x360 [ 310.388588][T12578] ? do_sys_openat2+0x71c/0x830 [ 310.393277][T12578] __get_vm_area_node+0x117/0x360 [ 310.398136][T12578] __vmalloc_node_range+0xe2/0x8d0 [ 310.403080][T12578] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 310.408462][T12578] ? selinux_capset+0xf0/0xf0 [ 310.412973][T12578] ? kstrtouint_from_user+0x20a/0x2a0 [ 310.418184][T12578] ? kstrtol_from_user+0x310/0x310 [ 310.423135][T12578] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 310.428599][T12578] __vmalloc+0x7a/0x90 [ 310.432517][T12578] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 310.437883][T12578] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 310.443092][T12578] ? bpf_prog_alloc+0x15/0x1e0 [ 310.447697][T12578] bpf_prog_alloc+0x1f/0x1e0 [ 310.452212][T12578] bpf_prog_load+0x800/0x1b50 [ 310.456723][T12578] ? map_freeze+0x370/0x370 [ 310.461067][T12578] ? selinux_bpf+0xcb/0x100 [ 310.465401][T12578] ? security_bpf+0x82/0xb0 [ 310.469740][T12578] __sys_bpf+0x4bc/0x760 [ 310.473819][T12578] ? fput_many+0x160/0x1b0 [ 310.478074][T12578] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 310.483286][T12578] ? debug_smp_processor_id+0x17/0x20 [ 310.488485][T12578] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 310.494391][T12578] __x64_sys_bpf+0x7c/0x90 [ 310.498642][T12578] do_syscall_64+0x3d/0xb0 [ 310.502891][T12578] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 310.508618][T12578] RIP: 0033:0x7f5aa8b55f19 [ 310.512876][T12578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 310.532318][T12578] RSP: 002b:00007f5aa7dd7048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 310.540557][T12578] RAX: ffffffffffffffda RBX: 00007f5aa8ce5f60 RCX: 00007f5aa8b55f19 [ 310.548369][T12578] RDX: 0000000000000048 RSI: 0000000020000440 RDI: 0000000000000005 [ 310.556181][T12578] RBP: 00007f5aa7dd70a0 R08: 0000000000000000 R09: 0000000000000000 [ 310.563996][T12578] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 310.571807][T12578] R13: 000000000000000b R14: 00007f5aa8ce5f60 R15: 00007fff2136e7e8 [ 310.579624][T12578] [ 310.921921][T12595] device pim6reg1 entered promiscuous mode [ 310.946414][T12598] device pim6reg1 entered promiscuous mode [ 311.081480][T12605] FAULT_INJECTION: forcing a failure. [ 311.081480][T12605] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 311.122758][T12605] CPU: 1 PID: 12605 Comm: syz.0.4781 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 311.132574][T12605] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 311.142470][T12605] Call Trace: [ 311.145592][T12605] [ 311.148383][T12605] dump_stack_lvl+0x151/0x1b7 [ 311.152887][T12605] ? io_uring_drop_tctx_refs+0x190/0x190 [ 311.158353][T12605] ? __kasan_check_write+0x14/0x20 [ 311.163300][T12605] ? __alloc_skb+0x355/0x550 [ 311.167725][T12605] dump_stack+0x15/0x17 [ 311.171719][T12605] should_fail+0x3c6/0x510 [ 311.176068][T12605] should_fail_usercopy+0x1a/0x20 [ 311.180929][T12605] _copy_from_iter+0x22f/0xdc0 [ 311.185531][T12605] ? copy_mc_pipe_to_iter+0x760/0x760 [ 311.190737][T12605] ? __check_object_size+0x2ec/0x3d0 [ 311.195855][T12605] skb_copy_datagram_from_iter+0x100/0x6d0 [ 311.201515][T12605] tun_get_user+0x112d/0x3aa0 [ 311.206096][T12605] ? kasan_set_track+0x4b/0x70 [ 311.210898][T12605] ? kasan_set_free_info+0x23/0x40 [ 311.215849][T12605] ? _kstrtoull+0x3a0/0x4a0 [ 311.220184][T12605] ? tun_do_read+0x1ef0/0x1ef0 [ 311.224784][T12605] ? kstrtouint_from_user+0x20a/0x2a0 [ 311.229995][T12605] ? kstrtol_from_user+0x310/0x310 [ 311.234948][T12605] ? avc_policy_seqno+0x1b/0x70 [ 311.239627][T12605] ? selinux_file_permission+0x2c4/0x570 [ 311.245095][T12605] tun_chr_write_iter+0x1e1/0x2e0 [ 311.249958][T12605] vfs_write+0xd5d/0x1110 [ 311.254143][T12605] ? kmem_cache_free+0x116/0x2e0 [ 311.258898][T12605] ? file_end_write+0x1c0/0x1c0 [ 311.263590][T12605] ? __fdget_pos+0x209/0x3a0 [ 311.268002][T12605] ? ksys_write+0x77/0x2c0 [ 311.272262][T12605] ksys_write+0x199/0x2c0 [ 311.276430][T12605] ? __ia32_sys_read+0x90/0x90 [ 311.281026][T12605] ? debug_smp_processor_id+0x17/0x20 [ 311.286234][T12605] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 311.292135][T12605] __x64_sys_write+0x7b/0x90 [ 311.296562][T12605] do_syscall_64+0x3d/0xb0 [ 311.300813][T12605] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 311.306628][T12605] RIP: 0033:0x7f3b5e5aff19 [ 311.310883][T12605] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 311.330324][T12605] RSP: 002b:00007f3b5d831048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 311.338570][T12605] RAX: ffffffffffffffda RBX: 00007f3b5e73ff60 RCX: 00007f3b5e5aff19 [ 311.346376][T12605] RDX: 000000000000fdef RSI: 0000000020000300 RDI: 00000000000000c8 [ 311.354191][T12605] RBP: 00007f3b5d8310a0 R08: 0000000000000000 R09: 0000000000000000 [ 311.362106][T12605] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 311.369915][T12605] R13: 000000000000000b R14: 00007f3b5e73ff60 R15: 00007ffd11695088 [ 311.378023][T12605] [ 311.555375][T12600] device syzkaller0 entered promiscuous mode [ 311.611736][T12611] FAULT_INJECTION: forcing a failure. [ 311.611736][T12611] name failslab, interval 1, probability 0, space 0, times 0 [ 311.624358][T12611] CPU: 0 PID: 12611 Comm: syz.0.4782 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 311.634170][T12611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 311.644053][T12611] Call Trace: [ 311.647175][T12611] [ 311.649952][T12611] dump_stack_lvl+0x151/0x1b7 [ 311.654464][T12611] ? io_uring_drop_tctx_refs+0x190/0x190 [ 311.659931][T12611] ? __stack_depot_save+0x34/0x470 [ 311.664885][T12611] dump_stack+0x15/0x17 [ 311.668875][T12611] should_fail+0x3c6/0x510 [ 311.673127][T12611] __should_failslab+0xa4/0xe0 [ 311.677728][T12611] should_failslab+0x9/0x20 [ 311.682066][T12611] slab_pre_alloc_hook+0x37/0xd0 [ 311.686841][T12611] kmem_cache_alloc_trace+0x48/0x210 [ 311.692062][T12611] ? __get_vm_area_node+0x117/0x360 [ 311.697100][T12611] __get_vm_area_node+0x117/0x360 [ 311.701959][T12611] __vmalloc_node_range+0xe2/0x8d0 [ 311.706900][T12611] ? htab_map_alloc+0x3b9/0x1440 [ 311.711678][T12611] bpf_map_area_alloc+0xd9/0xf0 [ 311.716361][T12611] ? htab_map_alloc+0x3b9/0x1440 [ 311.721139][T12611] htab_map_alloc+0x3b9/0x1440 [ 311.725743][T12611] map_create+0x411/0x2050 [ 311.729989][T12611] __sys_bpf+0x296/0x760 [ 311.734068][T12611] ? fput_many+0x160/0x1b0 [ 311.738322][T12611] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 311.743529][T12611] ? debug_smp_processor_id+0x17/0x20 [ 311.748732][T12611] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 311.754636][T12611] __x64_sys_bpf+0x7c/0x90 [ 311.758887][T12611] do_syscall_64+0x3d/0xb0 [ 311.763149][T12611] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 311.768872][T12611] RIP: 0033:0x7f3b5e5aff19 [ 311.773126][T12611] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 311.792566][T12611] RSP: 002b:00007f3b5d831048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 311.800941][T12611] RAX: ffffffffffffffda RBX: 00007f3b5e73ff60 RCX: 00007f3b5e5aff19 [ 311.808757][T12611] RDX: 0000000000000048 RSI: 00000000200005c0 RDI: 0000000000000000 [ 311.816569][T12611] RBP: 00007f3b5d8310a0 R08: 0000000000000000 R09: 0000000000000000 [ 311.824473][T12611] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 311.832278][T12611] R13: 000000000000000b R14: 00007f3b5e73ff60 R15: 00007ffd11695088 [ 311.840087][T12611] [ 311.907135][ T30] audit: type=1400 audit(1721705448.633:140): avc: denied { create } for pid=12622 comm="syz.0.4785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 311.962964][ T30] audit: type=1400 audit(1721705448.633:141): avc: denied { write } for pid=12622 comm="syz.0.4785" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 312.155111][T12638] device pim6reg1 entered promiscuous mode [ 312.276535][T12656] FAULT_INJECTION: forcing a failure. [ 312.276535][T12656] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 312.350907][T12656] CPU: 1 PID: 12656 Comm: syz.3.4796 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 312.360723][T12656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 312.370617][T12656] Call Trace: [ 312.373746][T12656] [ 312.376529][T12656] dump_stack_lvl+0x151/0x1b7 [ 312.381032][T12656] ? io_uring_drop_tctx_refs+0x190/0x190 [ 312.386536][T12656] ? __kasan_check_write+0x14/0x20 [ 312.391447][T12656] dump_stack+0x15/0x17 [ 312.395440][T12656] should_fail+0x3c6/0x510 [ 312.399697][T12656] should_fail_usercopy+0x1a/0x20 [ 312.404550][T12656] _copy_from_user+0x20/0xd0 [ 312.408979][T12656] iovec_from_user+0xc7/0x330 [ 312.413490][T12656] __import_iovec+0x6d/0x420 [ 312.417917][T12656] ? __ia32_sys_shutdown+0x70/0x70 [ 312.422868][T12656] import_iovec+0xe5/0x120 [ 312.427116][T12656] ___sys_sendmsg+0x215/0x2e0 [ 312.431631][T12656] ? __sys_sendmsg+0x260/0x260 [ 312.436238][T12656] ? __fdget+0x1bc/0x240 [ 312.440311][T12656] __se_sys_sendmsg+0x19a/0x260 [ 312.444997][T12656] ? __x64_sys_sendmsg+0x90/0x90 [ 312.449769][T12656] ? ksys_write+0x260/0x2c0 [ 312.454113][T12656] ? debug_smp_processor_id+0x17/0x20 [ 312.459316][T12656] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 312.465219][T12656] __x64_sys_sendmsg+0x7b/0x90 [ 312.469825][T12656] do_syscall_64+0x3d/0xb0 [ 312.474072][T12656] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 312.479803][T12656] RIP: 0033:0x7f16052eff19 [ 312.484055][T12656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 312.503495][T12656] RSP: 002b:00007f1604571048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 312.511737][T12656] RAX: ffffffffffffffda RBX: 00007f160547ff60 RCX: 00007f16052eff19 [ 312.519548][T12656] RDX: 0000000000000000 RSI: 0000000020004440 RDI: 0000000000000007 [ 312.527362][T12656] RBP: 00007f16045710a0 R08: 0000000000000000 R09: 0000000000000000 [ 312.535171][T12656] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 312.542983][T12656] R13: 000000000000000b R14: 00007f160547ff60 R15: 00007ffe57aec328 [ 312.550802][T12656] [ 312.574611][T12662] device syzkaller0 entered promiscuous mode [ 313.864509][T12705] syz.1.4814[12705] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 313.864593][T12705] syz.1.4814[12705] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.010389][T12713] syz.4.4815[12713] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.120469][T12716] syz.4.4815[12716] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.402466][T12717] device syzkaller0 entered promiscuous mode [ 314.933823][T12731] device pim6reg1 entered promiscuous mode [ 314.983714][T12734] syz.1.4822[12734] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.103197][T12748] FAULT_INJECTION: forcing a failure. [ 315.103197][T12748] name failslab, interval 1, probability 0, space 0, times 0 [ 315.161355][T12749] syz.3.4828[12749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.161811][T12748] CPU: 0 PID: 12748 Comm: syz.4.4829 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 315.169579][T12749] syz.3.4828[12749] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.173033][T12748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 315.173048][T12748] Call Trace: [ 315.173055][T12748] [ 315.173063][T12748] dump_stack_lvl+0x151/0x1b7 [ 315.173090][T12748] ? io_uring_drop_tctx_refs+0x190/0x190 [ 315.219795][T12748] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 315.225785][T12748] dump_stack+0x15/0x17 [ 315.229774][T12748] should_fail+0x3c6/0x510 [ 315.234030][T12748] __should_failslab+0xa4/0xe0 [ 315.238627][T12748] should_failslab+0x9/0x20 [ 315.242967][T12748] slab_pre_alloc_hook+0x37/0xd0 [ 315.247737][T12748] kmem_cache_alloc_trace+0x48/0x210 [ 315.252860][T12748] ? __get_vm_area_node+0x117/0x360 [ 315.257899][T12748] __get_vm_area_node+0x117/0x360 [ 315.262755][T12748] __vmalloc_node_range+0xe2/0x8d0 [ 315.267701][T12748] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 315.273077][T12748] ? selinux_capset+0xf0/0xf0 [ 315.277603][T12748] ? kstrtouint_from_user+0x20a/0x2a0 [ 315.282808][T12748] ? kstrtol_from_user+0x310/0x310 [ 315.287748][T12748] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 315.293126][T12748] __vmalloc+0x7a/0x90 [ 315.297037][T12748] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 315.302414][T12748] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 315.307620][T12748] ? bpf_prog_alloc+0x15/0x1e0 [ 315.312227][T12748] bpf_prog_alloc+0x1f/0x1e0 [ 315.316650][T12748] bpf_prog_load+0x800/0x1b50 [ 315.321178][T12748] ? map_freeze+0x370/0x370 [ 315.325524][T12748] ? selinux_bpf+0xcb/0x100 [ 315.329849][T12748] ? security_bpf+0x82/0xb0 [ 315.334182][T12748] __sys_bpf+0x4bc/0x760 [ 315.338258][T12748] ? fput_many+0x160/0x1b0 [ 315.342514][T12748] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 315.347733][T12748] __x64_sys_bpf+0x7c/0x90 [ 315.351971][T12748] do_syscall_64+0x3d/0xb0 [ 315.356312][T12748] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 315.361954][T12748] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 315.367728][T12748] RIP: 0033:0x7f294ba85f19 [ 315.371938][T12748] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 315.391381][T12748] RSP: 002b:00007f294ad07048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 315.399621][T12748] RAX: ffffffffffffffda RBX: 00007f294bc15f60 RCX: 00007f294ba85f19 [ 315.407433][T12748] RDX: 0000000000000048 RSI: 00000000200017c0 RDI: 0000000000000005 [ 315.415244][T12748] RBP: 00007f294ad070a0 R08: 0000000000000000 R09: 0000000000000000 [ 315.423056][T12748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 315.430870][T12748] R13: 000000000000000b R14: 00007f294bc15f60 R15: 00007fff37eb2228 [ 315.438687][T12748] [ 315.469591][T12754] syz.3.4828[12754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.469671][T12754] syz.3.4828[12754] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 315.492010][T12748] warn_alloc: 1 callbacks suppressed [ 315.492045][T12748] syz.4.4829: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=syz4,mems_allowed=0 [ 315.571066][T12748] CPU: 1 PID: 12748 Comm: syz.4.4829 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 315.580889][T12748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 315.590785][T12748] Call Trace: [ 315.593942][T12748] [ 315.596709][T12748] dump_stack_lvl+0x151/0x1b7 [ 315.601252][T12748] ? io_uring_drop_tctx_refs+0x190/0x190 [ 315.606667][T12748] ? __rcu_read_unlock+0x7e/0xd0 [ 315.611438][T12748] dump_stack+0x15/0x17 [ 315.615607][T12748] warn_alloc+0x21a/0x390 [ 315.619773][T12748] ? zone_watermark_ok_safe+0x270/0x270 [ 315.625154][T12748] ? kmem_cache_alloc_trace+0x115/0x210 [ 315.630532][T12748] ? __get_vm_area_node+0x117/0x360 [ 315.635566][T12748] ? __get_vm_area_node+0x347/0x360 [ 315.640607][T12748] __vmalloc_node_range+0x2c1/0x8d0 [ 315.645643][T12748] ? selinux_capset+0xf0/0xf0 [ 315.650144][T12748] ? kstrtouint_from_user+0x20a/0x2a0 [ 315.655445][T12748] ? kstrtol_from_user+0x310/0x310 [ 315.660394][T12748] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 315.665775][T12748] __vmalloc+0x7a/0x90 [ 315.669678][T12748] ? bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 315.675069][T12748] bpf_prog_alloc_no_stats+0x3b/0x2f0 [ 315.680267][T12748] ? bpf_prog_alloc+0x15/0x1e0 [ 315.684868][T12748] bpf_prog_alloc+0x1f/0x1e0 [ 315.689293][T12748] bpf_prog_load+0x800/0x1b50 [ 315.693812][T12748] ? map_freeze+0x370/0x370 [ 315.698147][T12748] ? selinux_bpf+0xcb/0x100 [ 315.702487][T12748] ? security_bpf+0x82/0xb0 [ 315.706831][T12748] __sys_bpf+0x4bc/0x760 [ 315.710904][T12748] ? fput_many+0x160/0x1b0 [ 315.715159][T12748] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 315.720372][T12748] __x64_sys_bpf+0x7c/0x90 [ 315.724621][T12748] do_syscall_64+0x3d/0xb0 [ 315.728879][T12748] ? sysvec_apic_timer_interrupt+0x55/0xc0 [ 315.734510][T12748] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 315.740236][T12748] RIP: 0033:0x7f294ba85f19 [ 315.744490][T12748] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 315.763933][T12748] RSP: 002b:00007f294ad07048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 315.772177][T12748] RAX: ffffffffffffffda RBX: 00007f294bc15f60 RCX: 00007f294ba85f19 [ 315.779989][T12748] RDX: 0000000000000048 RSI: 00000000200017c0 RDI: 0000000000000005 [ 315.787805][T12748] RBP: 00007f294ad070a0 R08: 0000000000000000 R09: 0000000000000000 [ 315.795614][T12748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 315.803426][T12748] R13: 000000000000000b R14: 00007f294bc15f60 R15: 00007fff37eb2228 [ 315.811327][T12748] [ 315.818062][ T30] audit: type=1400 audit(1721705452.543:142): avc: denied { create } for pid=12751 comm="syz.1.4830" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 315.910940][T12748] Mem-Info: [ 315.914318][T12748] active_anon:110 inactive_anon:6702 isolated_anon:0 [ 315.914318][T12748] active_file:19411 inactive_file:3244 isolated_file:0 [ 315.914318][T12748] unevictable:0 dirty:474 writeback:0 [ 315.914318][T12748] slab_reclaimable:6769 slab_unreclaimable:78325 [ 315.914318][T12748] mapped:13957 shmem:3770 pagetables:511 bounce:0 [ 315.914318][T12748] kernel_misc_reclaimable:0 [ 315.914318][T12748] free:1569058 free_pcp:16584 free_cma:0 [ 315.957212][T12748] Node 0 active_anon:440kB inactive_anon:27908kB active_file:77644kB inactive_file:12976kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:55828kB dirty:1896kB writeback:0kB shmem:16380kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4544kB pagetables:2044kB all_unreclaimable? no [ 316.064986][T12748] DMA32 free:2976724kB min:62592kB low:78240kB high:93888kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2981396kB mlocked:0kB bounce:0kB free_pcp:4672kB local_pcp:56kB free_cma:0kB [ 316.093034][T12748] lowmem_reserve[]: 0 3941 3941 [ 316.097744][T12748] Normal free:3299508kB min:84860kB low:106072kB high:127284kB reserved_highatomic:0KB active_anon:1440kB inactive_anon:27708kB active_file:77644kB inactive_file:12976kB unevictable:0kB writepending:1896kB present:5242880kB managed:4035840kB mlocked:0kB bounce:0kB free_pcp:61788kB local_pcp:26976kB free_cma:0kB [ 316.126955][T12748] lowmem_reserve[]: 0 0 0 [ 316.131356][T12748] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 4*2048kB (UM) 723*4096kB (M) = 2976724kB [ 316.147576][T12748] Normal: 4115*4kB (UME) 2025*8kB (UME) 1178*16kB (UME) 984*32kB (UME) 732*64kB (UME) 355*128kB (UME) 188*256kB (UME) 102*512kB (UME) 63*1024kB (UME) 17*2048kB (UME) 714*4096kB (UM) = 3299508kB [ 316.169933][T12748] 26900 total pagecache pages [ 316.176769][T12748] 0 pages in swap cache [ 316.183128][T12748] Swap cache stats: add 0, delete 0, find 0/0 [ 316.233697][T12748] Free swap = 124996kB [ 316.237694][T12748] Total swap = 124996kB [ 316.251525][T12748] 2097051 pages RAM [ 316.255238][T12748] 0 pages HighMem/MovableOnly [ 316.270883][T12748] 342742 pages reserved [ 316.274970][T12748] 0 pages cma reserved [ 316.763030][T12792] device pim6reg1 entered promiscuous mode [ 316.773200][ T30] audit: type=1400 audit(1721705453.503:143): avc: denied { read } for pid=12791 comm="syz.0.4841" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 317.423090][T12801] syz.1.4843[12801] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.301536][T12855] device pim6reg1 entered promiscuous mode [ 319.345423][T12859] Â: renamed from pim6reg1 [ 319.450063][T12869] bpf_get_probe_write_proto: 3 callbacks suppressed [ 319.450085][T12869] syz.3.4866[12869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.468033][T12868] syz.1.4865[12868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.522131][T12871] syz.1.4865[12871] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.551211][T12869] syz.3.4866[12869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.571328][T12870] syz.3.4866[12870] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.600927][T12871] syz.1.4865[12871] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 319.710254][T12868] syz.1.4865[12868] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.339042][T12892] device pim6reg1 entered promiscuous mode [ 320.769753][T12906] syz.4.4879[12906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.769830][T12906] syz.4.4879[12906] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 320.897749][T12907] syz.4.4879[12907] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 321.739201][T12915] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.775511][T12935] FAULT_INJECTION: forcing a failure. [ 321.775511][T12935] name failslab, interval 1, probability 0, space 0, times 0 [ 321.856946][T12935] CPU: 1 PID: 12935 Comm: syz.0.4888 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 321.866769][T12935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 321.876672][T12935] Call Trace: [ 321.879788][T12935] [ 321.882568][T12935] dump_stack_lvl+0x151/0x1b7 [ 321.887167][T12935] ? io_uring_drop_tctx_refs+0x190/0x190 [ 321.892636][T12935] dump_stack+0x15/0x17 [ 321.896802][T12935] should_fail+0x3c6/0x510 [ 321.901098][T12935] __should_failslab+0xa4/0xe0 [ 321.905650][T12935] should_failslab+0x9/0x20 [ 321.909999][T12935] slab_pre_alloc_hook+0x37/0xd0 [ 321.914769][T12935] kmem_cache_alloc_trace+0x48/0x210 [ 321.919884][T12935] ? sk_psock_skb_ingress_self+0x60/0x330 [ 321.925444][T12935] ? migrate_disable+0x190/0x190 [ 321.930214][T12935] sk_psock_skb_ingress_self+0x60/0x330 [ 321.935599][T12935] sk_psock_verdict_recv+0x66d/0x840 [ 321.940728][T12935] unix_read_sock+0x132/0x370 [ 321.945233][T12935] ? sk_psock_skb_redirect+0x440/0x440 [ 321.950521][T12935] ? unix_stream_splice_actor+0x120/0x120 [ 321.956074][T12935] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 321.961376][T12935] ? unix_stream_splice_actor+0x120/0x120 [ 321.966930][T12935] sk_psock_verdict_data_ready+0x147/0x1a0 [ 321.972567][T12935] ? sk_psock_start_verdict+0xc0/0xc0 [ 321.977776][T12935] ? _raw_spin_lock+0xa4/0x1b0 [ 321.982374][T12935] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 321.988018][T12935] ? skb_queue_tail+0xfb/0x120 [ 321.992618][T12935] unix_dgram_sendmsg+0x15fa/0x2090 [ 321.997661][T12935] ? unix_dgram_poll+0x710/0x710 [ 322.002430][T12935] ? kmem_cache_free+0x116/0x2e0 [ 322.007197][T12935] ? ____kasan_slab_free+0x126/0x160 [ 322.012320][T12935] ? __kasan_slab_free+0x11/0x20 [ 322.017094][T12935] ? slab_free_freelist_hook+0xbd/0x190 [ 322.022907][T12935] ? security_socket_sendmsg+0x82/0xb0 [ 322.028203][T12935] ? unix_dgram_poll+0x710/0x710 [ 322.032976][T12935] ____sys_sendmsg+0x59e/0x8f0 [ 322.037580][T12935] ? __sys_sendmsg_sock+0x40/0x40 [ 322.042437][T12935] ? import_iovec+0xe5/0x120 [ 322.046863][T12935] ___sys_sendmsg+0x252/0x2e0 [ 322.051379][T12935] ? __sys_sendmsg+0x260/0x260 [ 322.055987][T12935] ? __fdget+0x1bc/0x240 [ 322.060060][T12935] __se_sys_sendmsg+0x19a/0x260 [ 322.064741][T12935] ? __x64_sys_sendmsg+0x90/0x90 [ 322.069514][T12935] ? ksys_write+0x260/0x2c0 [ 322.073856][T12935] ? debug_smp_processor_id+0x17/0x20 [ 322.079060][T12935] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 322.084973][T12935] __x64_sys_sendmsg+0x7b/0x90 [ 322.089564][T12935] do_syscall_64+0x3d/0xb0 [ 322.093814][T12935] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 322.099586][T12935] RIP: 0033:0x7f3b5e5aff19 [ 322.103804][T12935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 322.123323][T12935] RSP: 002b:00007f3b5d831048 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 322.131565][T12935] RAX: ffffffffffffffda RBX: 00007f3b5e73ff60 RCX: 00007f3b5e5aff19 [ 322.139379][T12935] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000006 [ 322.147191][T12935] RBP: 00007f3b5d8310a0 R08: 0000000000000000 R09: 0000000000000000 [ 322.154999][T12935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 322.162812][T12935] R13: 000000000000000b R14: 00007f3b5e73ff60 R15: 00007ffd11695088 [ 322.170629][T12935] [ 322.188228][T12915] bridge0: port 1(bridge_slave_0) entered disabled state [ 322.216199][T12915] device bridge_slave_0 entered promiscuous mode [ 322.222557][T12934] ================================================================== [ 322.230490][T12934] BUG: KASAN: use-after-free in consume_skb+0x3c/0x250 [ 322.237208][T12934] Read of size 4 at addr ffff88812255ad6c by task syz.0.4888/12934 [ 322.244932][T12934] [ 322.247099][T12934] CPU: 0 PID: 12934 Comm: syz.0.4888 Not tainted 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 322.256905][T12934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 322.266802][T12934] Call Trace: [ 322.269924][T12934] [ 322.272706][T12934] dump_stack_lvl+0x151/0x1b7 [ 322.277316][T12934] ? io_uring_drop_tctx_refs+0x190/0x190 [ 322.282781][T12934] ? panic+0x751/0x751 [ 322.286683][T12934] print_address_description+0x87/0x3b0 [ 322.292066][T12934] kasan_report+0x179/0x1c0 [ 322.296402][T12934] ? consume_skb+0x3c/0x250 [ 322.300742][T12934] ? consume_skb+0x3c/0x250 [ 322.305083][T12934] kasan_check_range+0x293/0x2a0 [ 322.309856][T12934] __kasan_check_read+0x11/0x20 [ 322.314543][T12934] consume_skb+0x3c/0x250 [ 322.318711][T12934] __sk_msg_free+0x2dd/0x370 [ 322.323141][T12934] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 322.328777][T12934] sk_psock_stop+0x44c/0x4d0 [ 322.333203][T12934] ? unix_peer_get+0xe0/0xe0 [ 322.337632][T12934] sock_map_close+0x2b9/0x4c0 [ 322.342143][T12934] ? sock_map_remove_links+0x570/0x570 [ 322.347439][T12934] ? rwsem_mark_wake+0x770/0x770 [ 322.352214][T12934] unix_release+0x82/0xc0 [ 322.356376][T12934] sock_close+0xdf/0x270 [ 322.360455][T12934] ? sock_mmap+0xa0/0xa0 [ 322.364534][T12934] __fput+0x3fe/0x910 [ 322.368358][T12934] ____fput+0x15/0x20 [ 322.372174][T12934] task_work_run+0x129/0x190 [ 322.376600][T12934] exit_to_user_mode_loop+0xc4/0xe0 [ 322.381636][T12934] exit_to_user_mode_prepare+0x5a/0xa0 [ 322.386927][T12934] syscall_exit_to_user_mode+0x26/0x160 [ 322.392308][T12934] do_syscall_64+0x49/0xb0 [ 322.396571][T12934] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 322.402288][T12934] RIP: 0033:0x7f3b5e5aff19 [ 322.406546][T12934] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 322.426073][T12934] RSP: 002b:00007ffd11695168 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 322.434319][T12934] RAX: 0000000000000000 RBX: 00007f3b5e741a60 RCX: 00007f3b5e5aff19 [ 322.442128][T12934] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 322.449947][T12934] RBP: 00007f3b5e741a60 R08: 0000000000000000 R09: 0000000a1169548f [ 322.457754][T12934] R10: 000000000003fd98 R11: 0000000000000246 R12: 000000000004ebf1 [ 322.465578][T12934] R13: 0000000000000032 R14: 00007f3b5e741a60 R15: 00007ffd11695250 [ 322.473468][T12934] [ 322.476334][T12934] [ 322.478500][T12934] Allocated by task 12935: [ 322.482767][T12934] __kasan_slab_alloc+0xb1/0xe0 [ 322.487436][T12934] slab_post_alloc_hook+0x53/0x2c0 [ 322.492384][T12934] kmem_cache_alloc+0xf5/0x200 [ 322.496979][T12934] skb_clone+0x1d1/0x360 [ 322.501063][T12934] sk_psock_verdict_recv+0x53/0x840 [ 322.506183][T12934] unix_read_sock+0x132/0x370 [ 322.510697][T12934] sk_psock_verdict_data_ready+0x147/0x1a0 [ 322.516341][T12934] unix_dgram_sendmsg+0x15fa/0x2090 [ 322.521370][T12934] ____sys_sendmsg+0x59e/0x8f0 [ 322.525968][T12934] ___sys_sendmsg+0x252/0x2e0 [ 322.530484][T12934] __se_sys_sendmsg+0x19a/0x260 [ 322.535168][T12934] __x64_sys_sendmsg+0x7b/0x90 [ 322.539779][T12934] do_syscall_64+0x3d/0xb0 [ 322.544021][T12934] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 322.549748][T12934] [ 322.551919][T12934] Freed by task 12646: [ 322.555827][T12934] kasan_set_track+0x4b/0x70 [ 322.560250][T12934] kasan_set_free_info+0x23/0x40 [ 322.565024][T12934] ____kasan_slab_free+0x126/0x160 [ 322.569972][T12934] __kasan_slab_free+0x11/0x20 [ 322.574643][T12934] slab_free_freelist_hook+0xbd/0x190 [ 322.579781][T12934] kmem_cache_free+0x116/0x2e0 [ 322.584380][T12934] kfree_skbmem+0x104/0x170 [ 322.588718][T12934] kfree_skb+0xc2/0x360 [ 322.592719][T12934] sk_psock_backlog+0xc21/0xd90 [ 322.597397][T12934] process_one_work+0x6bb/0xc10 [ 322.602092][T12934] worker_thread+0xad5/0x12a0 [ 322.606694][T12934] kthread+0x421/0x510 [ 322.610594][T12934] ret_from_fork+0x1f/0x30 [ 322.614841][T12934] [ 322.617013][T12934] The buggy address belongs to the object at ffff88812255ac80 [ 322.617013][T12934] which belongs to the cache skbuff_head_cache of size 248 [ 322.631590][T12934] The buggy address is located 236 bytes inside of [ 322.631590][T12934] 248-byte region [ffff88812255ac80, ffff88812255ad78) [ 322.644906][T12934] The buggy address belongs to the page: [ 322.650382][T12934] page:ffffea0004895680 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12255a [ 322.660437][T12934] flags: 0x4000000000000200(slab|zone=1) [ 322.665913][T12934] raw: 4000000000000200 ffffea00046c8d00 0000000200000002 ffff888107f99080 [ 322.674334][T12934] raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000 [ 322.682751][T12934] page dumped because: kasan: bad access detected [ 322.689091][T12934] page_owner tracks the page as allocated [ 322.694636][T12934] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 12247, ts 299939591012, free_ts 260761550266 [ 322.710692][T12934] post_alloc_hook+0x1a3/0x1b0 [ 322.715294][T12934] prep_new_page+0x1b/0x110 [ 322.719629][T12934] get_page_from_freelist+0x3550/0x35d0 [ 322.725009][T12934] __alloc_pages+0x27e/0x8f0 [ 322.729439][T12934] new_slab+0x9a/0x4e0 [ 322.733344][T12934] ___slab_alloc+0x39e/0x830 [ 322.737771][T12934] __slab_alloc+0x4a/0x90 [ 322.741936][T12934] kmem_cache_alloc+0x134/0x200 [ 322.746621][T12934] __alloc_skb+0xbe/0x550 [ 322.750790][T12934] inet_netconf_notify_devconf+0x173/0x220 [ 322.756436][T12934] __devinet_sysctl_register+0x232/0x2a0 [ 322.761899][T12934] devinet_sysctl_register+0x16a/0x1e0 [ 322.767194][T12934] inetdev_init+0x284/0x4b0 [ 322.771535][T12934] inetdev_event+0x205/0x10a0 [ 322.776052][T12934] raw_notifier_call_chain+0x8c/0xf0 [ 322.781166][T12934] call_netdevice_notifiers+0x145/0x1b0 [ 322.786646][T12934] page last free stack trace: [ 322.791145][T12934] free_unref_page_prepare+0x7c8/0x7d0 [ 322.796445][T12934] free_unref_page+0xe8/0x750 [ 322.800957][T12934] __free_pages+0x61/0xf0 [ 322.805123][T12934] __vunmap+0x7bc/0x8f0 [ 322.809115][T12934] vfree+0x7f/0xb0 [ 322.812674][T12934] kcov_close+0x2b/0x50 [ 322.816671][T12934] __fput+0x3fe/0x910 [ 322.820488][T12934] ____fput+0x15/0x20 [ 322.824403][T12934] task_work_run+0x129/0x190 [ 322.828846][T12934] do_exit+0xc48/0x2ca0 [ 322.832848][T12934] do_group_exit+0x141/0x310 [ 322.837486][T12934] get_signal+0x7a3/0x1630 [ 322.841730][T12934] arch_do_signal_or_restart+0xbd/0x1680 [ 322.847201][T12934] exit_to_user_mode_loop+0xa0/0xe0 [ 322.852234][T12934] exit_to_user_mode_prepare+0x5a/0xa0 [ 322.857528][T12934] syscall_exit_to_user_mode+0x26/0x160 [ 322.862910][T12934] [ 322.865077][T12934] Memory state around the buggy address: [ 322.870547][T12934] ffff88812255ac00: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 322.878446][T12934] ffff88812255ac80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 322.886437][T12934] >ffff88812255ad00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc [ 322.894333][T12934] ^ [ 322.901627][T12934] ffff88812255ad80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 322.909523][T12934] ffff88812255ae00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 322.917421][T12934] ================================================================== [ 322.925321][T12934] Disabling lock debugging due to kernel taint [ 322.931362][T12934] ================================================================== [ 322.939206][T12934] BUG: KASAN: double-free or invalid-free in kmem_cache_free+0x116/0x2e0 [ 322.947456][T12934] [ 322.949623][T12934] CPU: 0 PID: 12934 Comm: syz.0.4888 Tainted: G B 5.15.151-syzkaller-00059-g5356d2f17edf #0 [ 322.960818][T12934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 322.970712][T12934] Call Trace: [ 322.973835][T12934] [ 322.976629][T12934] dump_stack_lvl+0x151/0x1b7 [ 322.981126][T12934] ? io_uring_drop_tctx_refs+0x190/0x190 [ 322.986591][T12934] ? __wake_up_klogd+0xd5/0x110 [ 322.991283][T12934] ? panic+0x751/0x751 [ 322.995186][T12934] ? kmem_cache_free+0x116/0x2e0 [ 322.999958][T12934] print_address_description+0x87/0x3b0 [ 323.005341][T12934] ? asm_common_interrupt+0x27/0x40 [ 323.010372][T12934] ? kmem_cache_free+0x116/0x2e0 [ 323.015146][T12934] ? kmem_cache_free+0x116/0x2e0 [ 323.019922][T12934] kasan_report_invalid_free+0x6b/0xa0 [ 323.025215][T12934] ____kasan_slab_free+0x13e/0x160 [ 323.030161][T12934] __kasan_slab_free+0x11/0x20 [ 323.034762][T12934] slab_free_freelist_hook+0xbd/0x190 [ 323.040279][T12934] ? kfree_skbmem+0x104/0x170 [ 323.044775][T12934] kmem_cache_free+0x116/0x2e0 [ 323.049378][T12934] kfree_skbmem+0x104/0x170 [ 323.053722][T12934] consume_skb+0xb4/0x250 [ 323.057875][T12934] __sk_msg_free+0x2dd/0x370 [ 323.062306][T12934] ? _raw_spin_unlock_irqrestore+0x5c/0x80 [ 323.067954][T12934] sk_psock_stop+0x44c/0x4d0 [ 323.072371][T12934] ? unix_peer_get+0xe0/0xe0 [ 323.076799][T12934] sock_map_close+0x2b9/0x4c0 [ 323.081313][T12934] ? sock_map_remove_links+0x570/0x570 [ 323.086741][T12934] ? rwsem_mark_wake+0x770/0x770 [ 323.091616][T12934] unix_release+0x82/0xc0 [ 323.095871][T12934] sock_close+0xdf/0x270 [ 323.099943][T12934] ? sock_mmap+0xa0/0xa0 [ 323.104112][T12934] __fput+0x3fe/0x910 [ 323.107933][T12934] ____fput+0x15/0x20 [ 323.111847][T12934] task_work_run+0x129/0x190 [ 323.116259][T12934] exit_to_user_mode_loop+0xc4/0xe0 [ 323.121289][T12934] exit_to_user_mode_prepare+0x5a/0xa0 [ 323.126682][T12934] syscall_exit_to_user_mode+0x26/0x160 [ 323.132056][T12934] do_syscall_64+0x49/0xb0 [ 323.136306][T12934] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 323.142036][T12934] RIP: 0033:0x7f3b5e5aff19 [ 323.146291][T12934] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 323.165729][T12934] RSP: 002b:00007ffd11695168 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 323.173977][T12934] RAX: 0000000000000000 RBX: 00007f3b5e741a60 RCX: 00007f3b5e5aff19 [ 323.181871][T12934] RDX: 0000000000000000 RSI: 000000000000001e RDI: 0000000000000003 [ 323.189682][T12934] RBP: 00007f3b5e741a60 R08: 0000000000000000 R09: 0000000a1169548f [ 323.197496][T12934] R10: 000000000003fd98 R11: 0000000000000246 R12: 000000000004ebf1 [ 323.205303][T12934] R13: 0000000000000032 R14: 00007f3b5e741a60 R15: 00007ffd11695250 [ 323.213122][T12934] [ 323.215980][T12934] [ 323.218153][T12934] Allocated by task 12935: [ 323.222406][T12934] __kasan_slab_alloc+0xb1/0xe0 [ 323.227093][T12934] slab_post_alloc_hook+0x53/0x2c0 [ 323.232036][T12934] kmem_cache_alloc+0xf5/0x200 [ 323.236640][T12934] skb_clone+0x1d1/0x360 [ 323.240723][T12934] sk_psock_verdict_recv+0x53/0x840 [ 323.245765][T12934] unix_read_sock+0x132/0x370 [ 323.250274][T12934] sk_psock_verdict_data_ready+0x147/0x1a0 [ 323.255907][T12934] unix_dgram_sendmsg+0x15fa/0x2090 [ 323.260947][T12934] ____sys_sendmsg+0x59e/0x8f0 [ 323.265539][T12934] ___sys_sendmsg+0x252/0x2e0 [ 323.270051][T12934] __se_sys_sendmsg+0x19a/0x260 [ 323.274745][T12934] __x64_sys_sendmsg+0x7b/0x90 [ 323.279339][T12934] do_syscall_64+0x3d/0xb0 [ 323.283591][T12934] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 323.289317][T12934] [ 323.291491][T12934] Freed by task 12646: [ 323.295395][T12934] kasan_set_track+0x4b/0x70 [ 323.299820][T12934] kasan_set_free_info+0x23/0x40 [ 323.304592][T12934] ____kasan_slab_free+0x126/0x160 [ 323.309542][T12934] __kasan_slab_free+0x11/0x20 [ 323.314142][T12934] slab_free_freelist_hook+0xbd/0x190 [ 323.319350][T12934] kmem_cache_free+0x116/0x2e0 [ 323.323950][T12934] kfree_skbmem+0x104/0x170 [ 323.328288][T12934] kfree_skb+0xc2/0x360 [ 323.332282][T12934] sk_psock_backlog+0xc21/0xd90 [ 323.336972][T12934] process_one_work+0x6bb/0xc10 [ 323.341659][T12934] worker_thread+0xad5/0x12a0 [ 323.346198][T12934] kthread+0x421/0x510 [ 323.350072][T12934] ret_from_fork+0x1f/0x30 [ 323.354325][T12934] [ 323.356497][T12934] The buggy address belongs to the object at ffff88812255ac80 [ 323.356497][T12934] which belongs to the cache skbuff_head_cache of size 248 [ 323.370905][T12934] The buggy address is located 0 bytes inside of [ 323.370905][T12934] 248-byte region [ffff88812255ac80, ffff88812255ad78) [ 323.383839][T12934] The buggy address belongs to the page: [ 323.389309][T12934] page:ffffea0004895680 refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x12255a [ 323.399466][T12934] flags: 0x4000000000000200(slab|zone=1) [ 323.404947][T12934] raw: 4000000000000200 ffffea00046c8d00 0000000200000002 ffff888107f99080 [ 323.413349][T12934] raw: 0000000000000000 00000000000c000c 00000001ffffffff 0000000000000000 [ 323.421765][T12934] page dumped because: kasan: bad access detected [ 323.428027][T12934] page_owner tracks the page as allocated [ 323.433571][T12934] page last allocated via order 0, migratetype Unmovable, gfp_mask 0x112cc0(GFP_USER|__GFP_NOWARN|__GFP_NORETRY), pid 12247, ts 299939591012, free_ts 260761550266 [ 323.449712][T12934] post_alloc_hook+0x1a3/0x1b0 [ 323.454312][T12934] prep_new_page+0x1b/0x110 [ 323.458652][T12934] get_page_from_freelist+0x3550/0x35d0 [ 323.464035][T12934] __alloc_pages+0x27e/0x8f0 [ 323.468458][T12934] new_slab+0x9a/0x4e0 [ 323.472367][T12934] ___slab_alloc+0x39e/0x830 [ 323.476798][T12934] __slab_alloc+0x4a/0x90 [ 323.480961][T12934] kmem_cache_alloc+0x134/0x200 [ 323.485645][T12934] __alloc_skb+0xbe/0x550 [ 323.489808][T12934] inet_netconf_notify_devconf+0x173/0x220 [ 323.495453][T12934] __devinet_sysctl_register+0x232/0x2a0 [ 323.501017][T12934] devinet_sysctl_register+0x16a/0x1e0 [ 323.506307][T12934] inetdev_init+0x284/0x4b0 [ 323.510649][T12934] inetdev_event+0x205/0x10a0 [ 323.515159][T12934] raw_notifier_call_chain+0x8c/0xf0 [ 323.520369][T12934] call_netdevice_notifiers+0x145/0x1b0 [ 323.525752][T12934] page last free stack trace: [ 323.530264][T12934] free_unref_page_prepare+0x7c8/0x7d0 [ 323.535556][T12934] free_unref_page+0xe8/0x750 [ 323.540154][T12934] __free_pages+0x61/0xf0 [ 323.544325][T12934] __vunmap+0x7bc/0x8f0 [ 323.548328][T12934] vfree+0x7f/0xb0 [ 323.551874][T12934] kcov_close+0x2b/0x50 [ 323.555865][T12934] __fput+0x3fe/0x910 [ 323.559684][T12934] ____fput+0x15/0x20 [ 323.563520][T12934] task_work_run+0x129/0x190 [ 323.567930][T12934] do_exit+0xc48/0x2ca0 [ 323.571923][T12934] do_group_exit+0x141/0x310 [ 323.576351][T12934] get_signal+0x7a3/0x1630 [ 323.580600][T12934] arch_do_signal_or_restart+0xbd/0x1680 [ 323.586073][T12934] exit_to_user_mode_loop+0xa0/0xe0 [ 323.591105][T12934] exit_to_user_mode_prepare+0x5a/0xa0 [ 323.596397][T12934] syscall_exit_to_user_mode+0x26/0x160 [ 323.601782][T12934] [ 323.603946][T12934] Memory state around the buggy address: [ 323.609517][T12934] ffff88812255ab80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 323.617432][T12934] ffff88812255ac00: fb fb fb fb fb fb fb fc fc fc fc fc fc fc fc fc [ 323.625329][T12934] >ffff88812255ac80: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 323.633226][T12934] ^ [ 323.637134][T12934] ffff88812255ad00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fc [ 323.645135][T12934] ffff88812255ad80: fc fc fc fc fc fc fc fc fa fb fb fb fb fb fb fb [ 323.653031][T12934] ================================================================== [ 323.666422][T12915] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.673435][T12915] bridge0: port 2(bridge_slave_1) entered disabled state [ 323.680797][T12915] device bridge_slave_1 entered promiscuous mode [ 323.712529][T12938] device pim6reg1 entered promiscuous mode [ 323.777352][T12646] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 323.784762][T12646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 323.794176][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 323.803100][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 323.811230][ T2934] bridge0: port 1(bridge_slave_0) entered blocking state [ 323.818069][ T2934] bridge0: port 1(bridge_slave_0) entered forwarding state [ 323.825854][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 323.849941][T12915] device veth0_vlan entered promiscuous mode [ 323.857587][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 323.866017][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 323.873947][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 323.881391][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 323.888760][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 323.897883][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 323.905982][ T2934] bridge0: port 2(bridge_slave_1) entered blocking state [ 323.912839][ T2934] bridge0: port 2(bridge_slave_1) entered forwarding state [ 323.920046][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 323.928011][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 323.941023][ T1917] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 323.952092][T12915] device veth1_macvtap entered promiscuous mode [ 323.962170][T12646] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 323.972425][ T2934] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready