last executing test programs: 10.233693715s ago: executing program 2 (id=4818): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0xe, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x9}, 0x8, 0x10, &(0x7f0000000000)={0x2000002, 0x0, 0x80000001, 0xfffffffd}, 0x10}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x10, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0x3d}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x6, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x5}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffdffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000880)=@bpf_tracing={0x1a, 0x10, &(0x7f0000000940)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x31d}, {}, {}, [@alu={0x7, 0x1, 0x4, 0x1, 0x8, 0xfffffffffffffff4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000180)='syzkaller\x00', 0x19, 0x0, 0x0, 0x41100, 0x40, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f0000000280)={0x4, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x243db, r0, 0x1, &(0x7f0000000300)=[r1], &(0x7f00000009c0)=[{0x1, 0x3, 0xf, 0x7}], 0x10, 0x10000}, 0x90) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(0xffffffffffffffff) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$cgroup(0xffffffffffffffff, 0x0, 0x200002, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='signal_deliver\x00'}, 0x10) syz_open_procfs$namespace(0x0, 0xfffffffffffffffe) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="18270000", @ANYRES32=r1, @ANYBLOB="000000000500000018220000", @ANYRES32=r1, @ANYBLOB="32eb5d4f58cfaa7b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x40}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x40000000, 0x0, 0x0, 0x0, 0x0, 0x0) 4.804409378s ago: executing program 2 (id=4868): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000001c0)='D', 0x33fe0}], 0x1}, 0x20000040) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) close(r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='net_dev_xmit\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000980)='sys_exit\x00', r0}, 0x10) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)) (async) sendmsg$unix(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000001c0)='D', 0x33fe0}], 0x1}, 0x20000040) (async) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) (async) close(r1) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x6}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r4}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000100)='net_dev_xmit\x00', r5}, 0x10) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="b702000007000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd0cdfa146ec561750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e01f3440cee51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3670ef0e789f65f1328d6704902cbe7bc04b82d2789cad32b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fd3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337602d3e5a815232f5e16c1b30c3a6abc85018e5ff2c91018afc9ffc2cc788bee1b47683db012469398685211dfbbae3e2ed0a50e7393bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447e2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d300006aca54183fb01c73f979ca9857399537f5dc2a2d0e0000000000000578673f8b6e74ce23877a6b24db0e067345560942fa629fbef2461c96a088a22e8b15c3e233db7af22e30d46a9d26d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d73415cda2130f5011e48455b5a8b90dfae158b94f50adab988dd8e12baf5cc9398fff00404d5d99f82e20ee6a8c88e18c2977fb536a9caab37d9ac4cfc1c7b400000000000007ffc826b956ba859ac8e3c177b91bd7d5e41ff83ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d000069a16203a967c1bbe09315c29877a308bcc87dc3addb08142bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8240000e3428d2129369ee1b85af9ffffff0d0df414b315f651c8412392191fa83ee830548f11be359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92000000000f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb74d4ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905de328c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4eda0545c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708294cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a978ee56c83a3466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342e0eaf6f330e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbf1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea95ec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf81700cd9e5a225d67521dc728eac7d80a5656ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be3827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f969369de47422604e2fc5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293b6c833c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b612272d40f522d8c98c879aca11033ec14bb9cc16bd83a00840e31d828ec78e116ae46c4897e2795b6ff92e9a1e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbe71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd46dbd61627a2e0a74b5e6aefb7eee403502734137ff47a57f164391c673b6079e65d7295eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb74b5589829b6b0679b5d65a125e3af1130d66a7b66837ae7e7123dde7404a067ad0a6a2d6bec9411b61cad4121be3c72ff3a04713042253d438e7becf8120de3895b8ce974958bde39cb8da3427a2e9e2de936431e67fed5ab5684db07de39083d8948cc4c8a2608100000000000000000000aecb8b0b7941088f971ce17427eec32a012295cc0cdd32955176b6ad5a4bb953e58ccfa9428f452cfb5a48a9fda26db3985c8be3c2f99827da074825b01c4a3a71fb59d5798100000000000000c76b05a45d2dd8c20d971e2f3e4369168f5cb83d6ff3a18733fec726034fbfa95624135bee374414b2c8c61f52357a520efd6a10aff244bc8a62ed367981fb4d5d77f7bc093958ff46527499957da4934cd4b370cf76f72dd05fa80cdfb68c836fd81be7a58532e041a87f9222f157610a4bcdc05b2a55308c8e7568b90f7a338557e816a16972aea79dff5becefa6f9c5ce6c58fb38da9e7532dc53cfdc2e789b76f7d32aca1bfea2aa62621b78dded30fc07171866bf3d552900000000a32dda61eeda1750e157c2d569b9d08f583c0ee28daec2e8bb85f3c8e91c4448096ee953def18dc73e55cb30f9cd069d8780b00eaba382f0c3ae391c30a5f1b0f36dd0c2193b791995d2890327a10d7abac76d1202f72e97f0105184d7aaaab8d3e29c9a8d263f076b55cf53c5bb9c0662a3d19a6722d7f83ae4331d3256f90af0857788b380ccc3b266c418e66d1d756d5df6423dd0cea67bc235d3776d22270fc19301ead09f156893e9"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) (async) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r6, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) (async) 4.661132399s ago: executing program 2 (id=4870): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000000000000000000000008500000018000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001700000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000000700000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='tlb_flush\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r0, 0x0, 0xe40, 0xe40, &(0x7f00000002c0)="000000feffffffff", &(0x7f0000000300)=""/8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f000000}, 0x4c) 4.636660862s ago: executing program 2 (id=4871): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000feff17110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000400)={0xffffffffffffffff}) close(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x11}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) close(r0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f0000000340)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2}, 0x0, 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r2, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r3}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xa00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 4.547866599s ago: executing program 2 (id=4873): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000a0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000850000002a00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x1300, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 4.547664409s ago: executing program 2 (id=4874): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={r0, &(0x7f0000000380), 0x20000000}, 0x20) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0xe0, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000600), &(0x7f0000000640), 0x0, 0x10, &(0x7f0000000680), 0x0, 0x10, &(0x7f00000006c0), &(0x7f0000000700), 0x8, 0x16, 0x8, 0x8, &(0x7f00000007c0)}}, 0x10) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000480)=r1, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000004c0)="c8", &(0x7f0000000380), 0x5, r4}, 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xc, &(0x7f0000000040)=ANY=[@ANYRES32=r2], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r3, &(0x7f0000000280)="e7b2098ac0722e1e6f9317ec635394d8b5c1d6cf066dfb4af587b87ed3dae2c901678e0823d003adef3a389329f591bea1013bf30900bc0a887c91e146f3213b3a72ac43e902e3b75ae01a0790bacc7b878c8cd09094892a238943233ae60c177c4506a6a328ff1fe501522b22417020c911ed258bb935cb3f710f929700ea811e6890df198fe89ae274b3a08cf285bab51f231ef7acd91786d99aa804968aa614a55195c706ee5b59a7c1a4864a1b009f85cb3628942f84f6152842ca962df256f3ad0997", &(0x7f0000000040)=""/33}, 0x20) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r7 = openat$cgroup_freezer_state(r6, &(0x7f0000000140), 0x2, 0x0) r8 = openat$cgroup_procs(r6, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f00000000c0), 0x12) write$cgroup_freezer_state(r7, &(0x7f0000000400)='FROZEN\x00', 0x7) write$cgroup_freezer_state(r7, &(0x7f0000000080)='THAWED\x00', 0x7) socketpair(0xf, 0x3, 0x2, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xee, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20224, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0xfffffffe, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d34, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x19f2ebb1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(r6, &(0x7f0000000380)='blkio.throttle.io_service_bytes_recursive\x00', 0x0, 0x0) 2.850596568s ago: executing program 1 (id=4905): bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x90) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001100)={{r0, 0xffffffffffffffff}, &(0x7f0000001080), &(0x7f00000010c0)='%pI4 \x00'}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r1, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x17, &(0x7f00000007c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x1500}, {{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {0x85, 0x0, 0x0, 0x2a}}, {{0x6, 0x0, 0x6, 0x9, 0x0, 0x6, 0xe7030000}, {0x4, 0x0, 0x0, 0x6}}, [@printk={@llu, {0x5, 0x3, 0x3, 0xa, 0x9}, {0x5, 0x1, 0xa, 0x1, 0x9}, {0x7, 0x0, 0x3}, {}, {}, {0x14}}], {{0x4, 0x1, 0x5, 0x3}, {0x5, 0x0, 0xb, 0x3, 0x0, 0x2}}}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={0xffffffffffffffff, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) 1.939826632s ago: executing program 1 (id=4916): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00'}, 0x10) r0 = gettid() r1 = perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x0, 0x0, 0x3, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x2, @perf_bp={0x0, 0x4}, 0x100000, 0x0, 0x3, 0x0, 0x76, 0x3, 0xc, 0x0, 0xffff, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x1f, 0xac, 0x9, 0x5, 0x0, 0x2, 0x82241, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80000001, 0x1, @perf_bp={&(0x7f0000000080), 0x8}, 0x8800, 0x9, 0x6, 0x7, 0x5, 0x0, 0x7, 0x0, 0x8, 0x0, 0x5}, r0, 0x7, r1, 0x8) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r2, &(0x7f0000001100)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="0f060b7988", 0x5}], 0x1}, 0x0) recvmsg(r3, &(0x7f0000001380)={0x0, 0x0, 0x0}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x7, 0x7fe2, 0x1, 0x0, 0x1, 0x1, '\x00', 0x0, 0xffffffffffffffff, 0x900, 0xffffffff}, 0x48) gettid() bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r4}, 0x0, &(0x7f0000000280)}, 0x20) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x7a05, 0x1700) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x7, 0x2, 0x0, 0x2000, r6, 0x8001, '\x00', 0x0, r5, 0x400001, 0x1}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000eeab7874ed000007010000f8ffffffb702000008000000b70300000000009500"/88], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000fcffffff18110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f00000003c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r11}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r13) close(r12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) r14 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x1c1842, 0x0) ioctl$TUNSETIFF(r14, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r14, &(0x7f00000003c0)=ANY=[], 0xffdd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x10) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0x32600) write$cgroup_subtree(r6, 0x0, 0xda00) 1.781951135s ago: executing program 1 (id=4919): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r1, &(0x7f0000000000), 0x15) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="00000000000000000000a200000000000007020000f8ffffffb703000008000000b70400000000000085000000010020009508e13b793b3022ae36a2047a00"/77], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000540)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x102, 0x102, 0x6, [@datasec={0xe, 0x5, 0x0, 0xf, 0x3, [{0x4, 0x49, 0x10000}, {0x1, 0x8, 0x4}, {0x3, 0x0, 0xfffffff8}, {0x4, 0x200, 0x20}, {0x3, 0xfffffff8, 0x200}], "dbe294"}, @union={0x9, 0x3, 0x0, 0x5, 0x1, 0x101, [{0xe, 0x2, 0x62ae}, {0xe, 0x3, 0x9}, {0xb, 0x1, 0xc4b1}]}, @datasec={0xc, 0xa, 0x0, 0xf, 0x3, [{0x5, 0x8a12, 0x100}, {0x5, 0xf7, 0xfffffffd}, {0x3, 0xffffffd1, 0x2}, {0x5, 0x3ff, 0x6}, {0x2, 0x7, 0x6}, {0x4, 0xfffffff7, 0x6}, {0x2, 0x8, 0x7fffffff}, {0x2, 0x4a, 0x7}, {0x4, 0x5, 0x5}, {0x3, 0x6, 0x2}], "530c81"}]}, {0x0, [0x0, 0x30, 0x30, 0x0]}}, &(0x7f0000000300)=""/100, 0x122, 0x64, 0x0, 0x1000}, 0x20) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000480)='^\x00') bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000040)='%pi6 \x00'}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000ac0)={r4, 0x58, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r6 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000bc0)={&(0x7f0000000b00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x3, [@int={0x0, 0x0, 0x0, 0x1, 0x0, 0x1b, 0x0, 0x67, 0x1}, @fwd={0x2}]}, {0x0, [0x2e]}}, &(0x7f0000000b40)=""/71, 0x37, 0x47, 0x0, 0x4}, 0x20) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000c00)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0xff, '\x00', r5, r6, 0x4, 0x4, 0x4}, 0x48) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000d80)={r3, 0x20, &(0x7f0000000d40)={&(0x7f0000000c40)=""/20, 0x14, 0x0, &(0x7f0000000c80)=""/158, 0x9e}}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x1, 0x1c, &(0x7f0000000140)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r7}, {}, {0x85, 0x0, 0x0, 0x8}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000440)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8"], 0x0}, 0x90) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=@base={0x1, 0xa, 0x5, 0x7, 0xc1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000100), 0x3f, r9}, 0x38) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x2ca}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r10, 0x18000000000002a0, 0x2f9, 0x4888, &(0x7f0000000040)="b9010360000df000009e0ff008001fffffe100004000638977fbac14140fe0000001be3e7d2a182fff", 0x0, 0x104, 0x6000000000000000, 0x0, 0xfeb9, &(0x7f0000000400)="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"}, 0x28) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001880), 0x0, 0x1, r9}, 0x38) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r11}, 0x10) r12 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) r13 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) write$cgroup_subtree(r12, &(0x7f0000000280)=ANY=[], 0x7) write$cgroup_int(r13, &(0x7f0000000200), 0x43400) 1.147498996s ago: executing program 3 (id=4934): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000100)='GPL\x00'}, 0x80) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter, 0x48) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00'}) (async) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6gre0\x00'}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x89f1, &(0x7f0000000080)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000080)) (async) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000080)) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000800)='kfree_skb\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r5}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r6, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x1, 0x0, {0x1, 0x0, 0x2}}, 0x10, 0x0}, 0x0) 1.146906266s ago: executing program 3 (id=4936): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x5, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r2, 0x20e, 0x5ee, 0xfd000004, &(0x7f00000004c0)="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", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) 1.099822161s ago: executing program 3 (id=4938): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000d31500000000fa000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x4, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) 1.09970031s ago: executing program 3 (id=4939): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="3e000000000000007910900000000000620000000000000095000000000000009e574bffff1729aba9b39a58e3cd8757e44cf3611b8e327a0279acba1f7791408d1efa421239728e2e5cc319b58520609dfd4a1a021d000000000000efffff75c3d894d99aef659f8b0000c515d8c219fbd9da31fc3ce3e9a2653000aec385a84a3d3f466bba30ac1486a70037fb03adef1a427fb0f4cb3072182da7c30000000000000000000000000000000000000000000000000000297e9fed660213ecb576987ad0972f18fbb7c9ecc03901f028b15b30ecf3205f90c9684ddc80d13bf37afc00e5efd686e6fb5ef4ee00b66126f773434a5c0d2ad3526bc484a6b94396117615f78f97637d8f8838aa75efb657ddafb15b88d97e47731cc3f55ce4e6a42562e6fb1f0000003030249c350044b09c36d10549a5949ff21418f1517508fb13540a82b5030cd9bb1bb066ca833c1fef6cefa28543ee520e46a3e96aca0d5a5f8cb34ad9c54c3a9a698f835bb83bcfd81ac5cfa18ce0740717994b5152cd0fa735433e50dccee16a208245b4366d44bb7ebd169b9e3a66d0cb29291a50f642ae4cb007540c806cd1cf88fdcaa393d1e1a697649401a802b474e374c767cb1ce52fd917d6af3de547be8429540de37f868a7f25d47c4b710836436008d4e8c8b42aeee84629d06d75ef09e0260b41de1f750480e492b6822d6275b7ccda1141707069cdb21de7a98dc37efdd806cc3619ad0659998bdd90b008c1aed04ee682b8ffd25741abbd9c6482ca45b82b6b7f25f71280cd6ba8bbb1e32dfe84831d1fc132755ce9aaf1952cb6829e9d6f4cbd8a07dc0cebcad512b3e0f2daa622bc805d2e152e0765b20cd6c8e2f4fff81e1458a43f35d36b25225dc0fbaf3b8131f5a8ae73e8badc519350edf048d5f56617"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195}, 0x48) 1.09782029s ago: executing program 3 (id=4940): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000080180100002020702500000000002020207b0af8ff00000000bda107000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018010000202070250000000000202020db1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) unlink(&(0x7f0000000000)='./cgroup\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000", @ANYRES32, @ANYBLOB], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x90) r3 = perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee4, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="b7020000f53f6314bfa300000000000024020000fffeff7f7a03f0fff0ffffff79a4f0ff00000000b7060000ffffffff2e64050000000000750afaff07cd02020404000000247d60b7030000030a00006a0a00fe0000000c8500000013000000b70000000000002995000000000000001da5ad3548ebb63d18c5071c7e821c9b767ac8308fbcd5c5e4a5ad1065b572c2c9ff215ac60c2ceaea4c0ec908abb6e7325ec1956bd8660bf3664148a2c96752fe2bb328dff1a15750ab9a780001000000000000d4bf20c2bd152d814f01f2cd519e078d4ffab418e4682b2aec5e4a35629e8ef040c50287c37a7f4182f32333b08c6e497687e10a4daea5cac0ceafdbb126eb02a1f5104d16ddb64963d84d91814cd5817e0b8f6f5e6ee7a39e180b5a18ed786b782ab1321ea5e82ae5ba2c42a5e23ea6253d5df768d0cb9f35e4f41a6211e52bb3598e9b5d4f22d8c19f958e8b34de35949a7a48ce18799ee53da177a81ea65e652c1d71b7ee86a75b0100000042127a8f84538a9a311c757f7169f006f3f5c95177fbd0b14b36259e2905ef911785c88a16aae46084d676d8ef8aa6ecc2d32e3f4ee367c5a769c0a606636c9f4a4413c098f4fcc96623b7c373b0ef04d55b846b094bf97e2ef5987b6e09a6a7cab79bffda141f65e7d9ebe3be70c436432b70a80cce69df30d3d67d84ccf3f9db9b690111de2ddc4b153c989ef100bbf76063d3f6ffffb73d70e9c3d7b90aecf48e7565efff2dbbb512218c98442406333c890923a797e00b75481739952fe87fde27ce81893f54ec0ea8e792414f639bc9ce1fea3f6ac0d7025759d4b45576c205c70631e8ad585951950e521f4e210b6494e3c52d927195737945cc03d5668483151710de246420a1b6c55b73876a6ed7fd0d9338923789a1edcd8043fe83919088383268324a25df14010c8ed6b8d43400eaa00ff9bc46e1cfecbdc0e451ac53b409d04544d3a7edd4d447d2fb431e226ae182b8dcc86fe09b404e0b7c723d3b19c3dc382fa91fb0fb8f9f3f13296bb1758b24aad0922091d49e2bc408a5a37deee7a60b903d2d9fe9d451cafcc8dc389671c2d08b6e264150a6b9445b00cee4585af04fa69e0380be0d66649dcf3bf8a906b029faca75ce34c41aec7aa86e596119109ea8b3f7c65c902499227c087301643baab1c95bb22cedd913b22dcaa197ccc34586dc50bd9f4628e3e77a0de32e356521df06f995cb57f97052fc4158250ccecfb67ea8faf509593fadc7eafb613327b052397af1ede94d87590ce90a0a7579766f0e5eb09d38ac46e99e7ec4fcd3cb0b1a8c531724d5ef6b334803cedaa9cedf16dc3af6e0b67f62a83a256474c97c925d9d447175b535c87dbdeb0dcca5303eed6689ea91e1665c691df736368dde47e6672e93a314c5f60e7b68c2242bd0f0d8c66449d8687dcf2d0f76668b2b9bf8b32b99b7daf34b2d825d192ade90a1162acfe9749d516d014cef5f99126324ea02baea5808c430985749901b09e4902a6f5addc0103756b894418e4591c624a9b206abbfb888d413d923b0d7c9d997d6d8e64787c4d397f57a15b6e0b4212b6cb55b9c207bbe08f483b1bea05f41b9a1d3af087047c568ae6ebfc0bb5ec10b6290dc757a4903a88fb2c035b2349b6d2f0c051b8b7718384eebd5fc19928cea713ff09e179c308fbe9bd64374d96ef2447a2a4af5ca0c39e7ca2e801e57560a55e9cfa095cf3f74398219ad1030a79517a88de7596429a20793e12616aa32b3e720c6521fbe93963e9536d16f3db211fca7dd99c0a0125ff8ef534b93dcb34e1da2c008a9f2a29e30823bf0ec3639cadaf9be9608358e1e5ab17eea477b1754f78f45468c9568471667f82f5e250b979b9f2bd0d1b6bc03d11811ac6eec9a3ecd9e3c3299ee5eb3c6cac8fbd06514b7ee743ece79c04566d02a08fd5fcabbab3d129c0cced3ce11dafa380700000000000000c114d0b423e64c6157fac5e4e2168f33541daeff9983d0e488a78bef538f870b84798272b2101e0abf1cd64500b79e01e11d727389653bd80a39d5bbe2e23d2f5ff10047423429981bd9b4ce680e174c266391e3e7689452654e5cd5ada6e025327a1942b5a068f15fa58eaa267d4e0881783dddbdd777f8be0824ffdf6d06c621880dbbe9534f15e8c2e364d3ec67deb6ab9f2a0f03212972dbd38500000008173553a67be48633103809eee0be51d67d7ce230b389607b4c3b18da1c48f3180f2e0d79e54565fdd9a099b5b5ba2761905b88b7cbfc39c35dd153609da3da263438f12769602c2195245ff83e249119d4f6cabfbdef84ada19ef4a67ed66d7043036515d0be5a231f99e71aba5d5ae04676eff3e85f0844c41bbcfde7a931d1ec55c01f703bfd1b97756bfe55a91f6b379f34a018906339771157c66dbd7471d1beec7f029ef552cf5e92a1a0db21b59355763967ce26a577bc514b6d22a09c385c5ba6caf524e1688fc0f29f8bb35ae7bc8eb5ba51aebdf7d972c3267cedbe77ed70d9c539bc455a6f88b39196c8a224b0acf4d796fea59a07baa34cc270fb096ef330fbebdf872d7d0bc4f9a963355c554abc5cdb91464faabcd09cd9a53f5d1b2ea7e96f428f7cd6735c19c61dc9942d30bf29ef85ed01c2fcd6060aa40eeff971477b4fde48507b7bad95a496540adff7e4a72fd1f94d7c703ab1525c946c54e0da3d7ebfcc8cea2e84c3b310aaea5a1627df898c00a9aaf2d88a36afa4c5b1816384310600001c33125ad7f7970beeb256aec06e39fc6c66544e1d1dc5fea4b68a82e3568ca30aea9a1d097f06f11dc362f4bae5ef57c67686a15855cd351bf26f40fb1348cfce79897682228e6d9643530c81bab27bf7b1c4a76a5be180bb830cf06827c3f38a9c9c580c732c30aaceda78b0297de35a922b1375b129655beb31899e26052cc216f832fdb0a0015f93c9cff77f59cda1ec5f3e358848756cebb074266a47e39ae26e80e8c65aaf73c24925458520a9ca98760d1005c9f81846459ae6d5baa4f02807939ddc29c3520f7c58ed9bc5a569c7a1bc33cf4f330a18276ffb4550b9166c3939e8041094bec034aa0ec6638b74fe34f0f1ec6903a1135808d5d8d26c9203c3f87e66c407b7c5c0888d4558dd657cc0213efad68e76fdd7b23e68064fd4b271ed79c50abacdd2871b0c1f8c971df59a5a1901ddf804bed43e391f882d2a45c51cdbba86b2a1b7c0c4923642a731ea4dcbad2b6ebbebe787a8e28e781d75beee924b3b1e390750f316648133922c021f98fd2d5d71a7a3679397ef6cf432837b7e264831ec01c4c3146ba0caac3b13d55945ec00e978a1c1712cd51187936200606c9cd6877b2f72125295c54721f8e15df2ae282a8becb99a726fd92acc92141e1f574b4b0b3c992a61af3372d0d9217776b1a42cd2cee816a70bf1ddd69b590d53e28ba356e74b38e23e50d898e95cdc7cc809e462c884b53f672aab1411ecfd4c91e7a9782fc6763f0efd4bcbaf1fc3a00000000000000000000000000000000500000000000000000000000048e510340087caf22439d5304bd704a6a78a512269a9b1cbd13bea78c807bbc73853ae187cbb768673e9d1bf74a3b0a6c234accd8506adf314f4c5e08174540b69d3c0da660052b43b86baf49e7ac64d9c21598b1e01dc1e1b5a53626b090496dbf7af441e397016c3c094d5c91ffe0a7ceacfd225ed9a6c905f79ad7052747dd6cceef4c310e0e935311118bc6bf0e5ca6c7cca7d5c03be570308da8a40578b4db14961fbccf6e2f2d56e9509c434126515b56d032e20c12e830d1bc64826fc9b318da5911e466878dbb81edeff69363fb75af5cd80536f14d2eaa7764db23acdbd394bbbbccfd8b129258bb0a93cee1d44f8665172c06933d20f184b78b435462c52a85149451ffd564c56a7cbf11a1127c77242915e43b2bc"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYRES32=r4, @ANYRESDEC=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffd6b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 999.829469ms ago: executing program 0 (id=4943): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='net_dev_xmit\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000, 0x0, 0x300}, 0x2c) 999.215048ms ago: executing program 0 (id=4945): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0xc1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00', 0x8000}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETSNDBUF(r1, 0x400454d4, &(0x7f0000000100)=0x3) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000500)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) write$cgroup_devices(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="1e0308004d8c71ef288563"], 0xffdd) 995.156749ms ago: executing program 4 (id=4946): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000f7ff18120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001840)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000000), 0x222}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe28, 0xfffffffffffffff5, &(0x7f0000000980)="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", 0x0, 0x2f, 0xe8034000, 0xf000, 0xfffffffffffffe2a, &(0x7f0000000000), &(0x7f00000000c0)="c6769e45b7c61302926682c7f9e9bb5ba2b3cdf023e8da0392a4cd62e2370f25ae5ba0dab896bcf5b774cd28bebbde39f796ae27d04582bb7c03e9fe830ea22c9fd03f6d2779515fdad3f5d0de07b7b70996102fdb67b1e77a34a5b7136a212fa2c0ea502588309dc3e42c55a6f93e6ba5e1b492f9db48f0fdd2f9fb937b3e8a63dcf9dd855837433998ba579da27559", 0x5dc}, 0x28) 941.846453ms ago: executing program 1 (id=4947): bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) close(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r2, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000040)=@hci, 0x80, &(0x7f0000000100)=[{&(0x7f0000000400)=""/248, 0x200105d0}], 0x1}, 0x1f00) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$tipc(r1, &(0x7f0000000240)={0x0, 0xfffffff5, &(0x7f0000000200)=[{&(0x7f0000000140)="a2", 0xfffffdef}], 0x1}, 0xffffff7f) 941.104673ms ago: executing program 4 (id=4948): sendmsg$sock(0xffffffffffffffff, &(0x7f0000000d00)={&(0x7f0000000700)=@caif=@rfm={0x25, 0x0, "fe8f9342fd2ac503f90e87ea8b17c667"}, 0x80, &(0x7f0000000c00)=[{0x0}, {0x0}, {0x0}], 0x3, &(0x7f0000000c80)=[@timestamping={{0x14}}], 0x18}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000004c0), 0x48) close(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0xe, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x1b}, 0x48) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000300)=ANY=[], 0xfdef) 923.138445ms ago: executing program 4 (id=4949): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000380)=ANY=[@ANYBLOB="1801000000000000000000000000000085000000050000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008008000b703000000009c8c850000006d00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=@base={0x2, 0x4, 0x4, 0x8}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x1f, 0x4, 0x9, 0x0, r1}, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r2, &(0x7f0000000240), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0xfffffffffffffd08) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x4, &(0x7f0000001700)=ANY=[@ANYBLOB="18000000000000000000000000000000637014bb4b1ed7fe112800000000009500000000000000ad57bea88bb89d9bda268601614c0e1ad6caedb90b9781603fb7426f53afd8bfbf78c75615d2d336525bb625ac76b4c506bbd0e9a36b8b4675f14bb61bdc4c5e525f7ffd9593f6ad6954d33cfbe641417d6c119a909a6bed19805fa00f8b9f0ae06401e5d13422c4014a9a2a815356cfeca1d47f70f617ca5cf9c8f4c1523d2c5877d84ab964e2e1c5ea7c9effdfac00a16a3fec479821e451c7757064173e572869a9d3172a02a0e97a6647113dd7d845f8241b0eb2999d5658b2bc510445", @ANYRES32], &(0x7f00000000c0)='GPL\x00', 0x2004, 0xffb, &(0x7f0000000200)=""/4091, 0x0, 0x0, '\x00', 0x0, 0x15}, 0x90) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000300)={'syzkaller0\x00', 0x7101}) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000100)={'syzkaller0\x00', 0x7101}) write$cgroup_devices(r5, &(0x7f0000000200)=ANY=[@ANYBLOB="1e031800dd5c980128854d4a828e000000000033"], 0xffdd) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r6, 0xe0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1d5099557832beab, &(0x7f0000000180)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000240)=[0x0], 0x0, 0xfc, &(0x7f0000000280)=[{}, {}, {}, {}, {}, {}], 0x30, 0x10, &(0x7f0000001200), &(0x7f0000000300), 0x8, 0x87, 0x8, 0x8, &(0x7f0000000400)}}, 0x10) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cgroup.controllers\x00', 0x275a, 0x0) write$cgroup_pid(r8, &(0x7f00000002c0), 0x12) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000580)={0x2, 0x4, 0x8, 0x1, 0x80, 0x1, 0x8001, '\x00', r7, r8, 0x5, 0x2, 0x4}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000040)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) close(r0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) 842.038721ms ago: executing program 0 (id=4950): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000d31500000000fa000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='workqueue_activate_work\x00', r2}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000100)={0xe, 0x4, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf}, 0x90) 787.379286ms ago: executing program 0 (id=4951): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0xb0ff, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 787.165506ms ago: executing program 0 (id=4952): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x13, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000006d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102038800fe08000e40000200875a65969ff57b00ff0200000000000000000000fde10001"], 0xfdef) 786.950646ms ago: executing program 0 (id=4953): openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0xffffffffffffffff, &(0x7f0000000380), 0x20000000}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0x13, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000080180100002020702500000000002020207b0af8ff00000000bda107000000000007010000f8ffffffb702000008000000b703000000000000850000000500000018010000202070250000000000202020db1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r0) unlink(&(0x7f0000000000)='./cgroup\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000", @ANYRES32, @ANYBLOB], 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xee4, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x3, 0xe, &(0x7f0000001540)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x200000, 0x10, &(0x7f0000000000), 0x143}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 768.576177ms ago: executing program 4 (id=4954): openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r1}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1a, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="0000000300000000000000000d2fd3c333110000", @ANYRES32=r2], 0x0, 0x1f, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000040)={0xffffffffffffffff, 0x0, &(0x7f00000004c0)=""/200}, 0x20) r4 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000004850000006d0000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) ioctl$TUNATTACHFILTER(r3, 0x401054d5, &(0x7f0000002600)={0x2, &(0x7f0000000940)=[{0x2, 0x0, 0x2}, {0xa90a, 0x9, 0x3f, 0x1}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) socketpair(0x28, 0x0, 0x0, &(0x7f0000000040)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x8, 0x3, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x79, 0x10, 0x51}}, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8}, 0x90) ioctl$PERF_EVENT_IOC_PERIOD(r4, 0x4030582a, &(0x7f0000000040)) openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x3, 0x4, 0x4, 0x100002, 0x500, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x1}, 0x48) 758.957008ms ago: executing program 4 (id=4955): r0 = bpf$ITER_CREATE(0x21, &(0x7f0000000040), 0x8) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x18, 0x1b, &(0x7f0000000180)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8f, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r0}}, @printk={@llu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xffe}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000480)='GPL\x00', 0x80000001, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x90) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000080)={0x1b, 0x0, 0x0, 0x8, 0x0, r0, 0x2, '\x00', 0x0, r0, 0x1, 0x5, 0x5}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000980)={r0, 0x58, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1b, 0x7, 0x2, 0x38, 0x2412, 0x1, 0x6, '\x00', r2, r0, 0x1, 0x5}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000540)={r0, 0xe0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000340)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000380)=[0x0, 0x0, 0x0], &(0x7f00000003c0)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x4b, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000440), &(0x7f00000004c0), 0x8, 0x14, 0x8, 0x8, &(0x7f0000000500)}}, 0x10) r5 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000580), 0x4) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000480)={0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r6, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x2, 0x4, &(0x7f0000000300)=[0x0, 0x0], &(0x7f0000000340)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x12, &(0x7f0000000380)=[{}, {}, {}], 0x18, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x45, 0x8, 0x8, &(0x7f0000000580)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000840)=@bpf_lsm={0x1d, 0x10, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x100}, [@kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @ldst={0x0, 0x3, 0x2, 0x7, 0x6, 0x80}, @map_fd={0x18, 0x7, 0x1, 0x0, r1}, @map_idx_val={0x18, 0xa, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x800}, @exit, @map_val={0x18, 0x3, 0x2, 0x0, r3, 0x0, 0x0, 0x0, 0x2}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x0, 0x3, 0x6, 0x7, 0x1c, 0xfffffffffffffffc}]}, &(0x7f0000000000)='syzkaller\x00', 0x10001, 0x20, &(0x7f0000000300)=""/32, 0x41000, 0x0, '\x00', r4, 0x1b, r5, 0x8, &(0x7f00000005c0)={0x7, 0x2}, 0x8, 0x10, &(0x7f00000007c0)={0x4, 0x4, 0xfffffffa, 0x6}, 0x10, r7, 0x0, 0x1, 0x0, &(0x7f0000000800)=[{0x1, 0x5, 0x1, 0x3}], 0x10, 0x9}, 0x90) 628.104549ms ago: executing program 4 (id=4956): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000100"/24], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000d8ffffffb703000008000000b70400000000925e85"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x1a, 0x3, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000168c72ffb3d6117c00000000"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0xc5, &(0x7f0000000180)=""/197, 0x0, 0x0, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x2600}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={0x0}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r3}, 0x10) r4 = openat$cgroup_procs(r1, &(0x7f00000001c0)='tasks\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES64=r2, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r7}, 0x0, &(0x7f00000002c0)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) write$cgroup_pid(0xffffffffffffffff, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_procs(r9, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r10, &(0x7f0000000c40), 0x12) 250.95745ms ago: executing program 3 (id=4957): openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/syz0\x00', 0x200002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000e000018110000", @ANYRES32, @ANYBLOB="0000000000000000b708000000ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000980)='percpu_alloc_percpu\x00', r2}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000980)='percpu_alloc_percpu\x00', r2}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r1}, 0x10) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000020000088500000082"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="000800000000000000080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.time_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x4, 0xfff, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000024"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) unlink(0x0) (async) unlink(0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x12, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f00000002c0)='ext4_remove_blocks\x00', r7}, 0x10) write$cgroup_int(r4, &(0x7f0000000100), 0x1001) (async) write$cgroup_int(r4, &(0x7f0000000100), 0x1001) ioctl$SIOCSIFHWADDR(r4, 0x4030582b, &(0x7f0000000280)={'lo\x00', @link_local={0x1, 0x80, 0xc2, 0xc}}) socketpair(0x1a, 0x3, 0x5, &(0x7f0000000180)) (async) socketpair(0x1a, 0x3, 0x5, &(0x7f0000000180)) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x5, 0x4, 0x4, 0x4}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000002c40)={0xa, 0x17, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000005000000bf0900000000000066090600000003e7040000000600000018010000756c6c2500000000002020207d9af8ff00000000ad9100000000000037010000f8ffffffb700000008000000b70300000000000014000000060000005c93000000000000b5030200000000008500000000000000b70000000000000095000000000000006b0689eb1ff7ae9feed4d550164f4f4a9423ebc0932448431ad3ef0f55ae20891860e497598aa8bdb0d5d1b2ac965d8b64fbc172683859e05800"/233], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x8, 0x5}, 0x48) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0xa, 0x4, 0x69ee, 0x1, 0xd0}, 0x48) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, r9}, 0x38) 144.760108ms ago: executing program 1 (id=4958): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='cgroup.controllers\x00', 0x26e1, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000018115a8ad3d219125a52000004", @ANYRES32=r1, @ANYRES64=r0], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x63, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.swap.events\x00', 0x26e1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x4, 0xfff, 0x7}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000d40)={{}, &(0x7f0000000cc0), &(0x7f0000000340)='%ps \x00'}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0x4, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="180000003055892b00200000000000001811000076e9414fe2aeaac7bac32386c22ff2eae70c6f5dd9f4bcc9b5699310d042f6ed3e5d617316df3278fefcf9c137c39eda838af41ad35c89d5a4", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)='/proc/sys/net/\x00\x00v4\x00\x00s/\x92ync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd1l,'}, 0x30) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000008000000000000000000000d8500006d0000009500"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, r2}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) bpf$OBJ_GET_MAP(0x7, &(0x7f0000000300), 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xb, 0x16, &(0x7f0000000540)=ANY=[@ANYBLOB="611230000019000061134c0000000000bf2000000000000015000500511b48013d030100000000009500000000000000bc26000000000000bf67000000000000070300000fff07006702000003000000360600000ee600f0bf050000000000000f650000000000006507f4ff02000000070700004c0040001f75000000000000bf54000000000000070500000300f9ffad430100000000009500000000000000050000000000000095000000000000004d9bd591d568253e9988431ec068e3a83683d58719d72183f2cb7f43dd55788be820b236dcb695dbfd737cbf5fe7030586162c17600674290ca9d8d6413b8199e34f67ceaaa78710f9f8aba4765c91382f497585ca39c595b21afa6bce62b5ab0d44e9c32ad6f0349d92962a58d39494a19a9183362382792ac85578d3de07b7e155cf4ee5e3dd51212d2831bd8e2655b2fbd88791e4c66c832a774919b28b8a62711f0f156e636804e1d3f44a5ff3d63a3a51f0c7ec0c8c25e072194ddd83aa155a537e15c0d91f502deef03f83e826718705c9aef9613ac4a325a428d147c1749196e94226671fd9573ab0d079d44b13b56f793e98ab571c58e98e022f18a3be3f318e0690fff93f44f22473dc8004fc758218349bd3f0516a72a7ea913bfa7603063ed3118b2d680cbc"], &(0x7f0000000100)='GPL\x00'}, 0x48) bpf$MAP_DELETE_ELEM(0x2, &(0x7f0000000400)={0x1, &(0x7f0000000380), 0x20000000}, 0x20) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f00000004c0)=ANY=[@ANYBLOB="8fedcb7907001175f37538e486dd630080fc00082c00db5b6861589bcfe8875a060300000023000000000000000000000000ac1414"], 0xfdef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffe7d) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000018c0)={&(0x7f0000001880)='ext4_sync_file_exit\x00', r3}, 0x10) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000200), 0x43400) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'macsec0\x00', @random="a64beb939b96"}) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) 0s ago: executing program 1 (id=4959): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x2, 0x4, &(0x7f0000000240)=@framed={{}, [@jmp={0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x1b}]}, &(0x7f0000000280)='GPL\x00', 0x0, 0x94, &(0x7f00000002c0)=""/148}, 0x80) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000181100", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x3, 0x3, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x5}, 0x48) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x200039d8, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a000500feff"], &(0x7f0000000000)='GPL\x00', 0x6, 0xf4240, &(0x7f0000003300)=""/137, 0x68000000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9}, 0x80) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x1d, &(0x7f00000001c0), 0x4) kernel console output (not intermixed with test programs): 58408][ T4002] R13: 000000000000000b R14: 00007f6f35b75f60 R15: 00007ffed1357d88 [ 117.422093][ T4202] device syzkaller0 entered promiscuous mode [ 118.984429][ T4244] syzkaller0: mtu less than device minimum [ 121.001016][ T4289] device syzkaller0 entered promiscuous mode [ 121.055086][ T4293] device syzkaller0 entered promiscuous mode [ 121.446338][ T4319] device pim6reg1 entered promiscuous mode [ 123.051707][ T4441] device wg2 entered promiscuous mode [ 126.880449][ T4538] device syzkaller0 entered promiscuous mode [ 127.000619][ T4549] device syzkaller0 entered promiscuous mode [ 127.257710][ T4569] syz.2.1580[4569] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.257759][ T4569] syz.2.1580[4569] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 127.547531][ T4575] device veth1_macvtap left promiscuous mode [ 127.584354][ T4575] device macsec0 entered promiscuous mode [ 128.117897][ T4600] device syzkaller0 entered promiscuous mode [ 128.372405][ T24] audit: type=1400 audit(1720051594.149:149): avc: denied { create } for pid=4607 comm="syz.0.1594" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 130.889004][ T24] audit: type=1400 audit(1720051596.669:150): avc: denied { create } for pid=4684 comm="syz.0.1624" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 134.716215][ T4760] syz.0.1653[4760] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.716263][ T4760] syz.0.1653[4760] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.804233][ T4760] syz.0.1653[4760] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 134.824817][ T4760] syz.0.1653[4760] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 135.058394][ T4788] device pim6reg1 entered promiscuous mode [ 135.527449][ T4837] device syzkaller0 entered promiscuous mode [ 135.592254][ T24] audit: type=1400 audit(1720051601.369:151): avc: denied { create } for pid=4860 comm="syz.1.1694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 136.942476][ T4930] device sit0 left promiscuous mode [ 139.953489][ T5089] bridge0: port 2(bridge_slave_1) entered disabled state [ 139.960491][ T5089] bridge0: port 1(bridge_slave_0) entered disabled state [ 140.013616][ T5094] ÿÿÿÿÿÿ: renamed from bridge0 [ 140.662406][ T5127] sock: sock_set_timeout: `syz.2.1796' (pid 5127) tries to set negative timeout [ 141.330833][ T5147] device veth1_macvtap left promiscuous mode [ 141.339009][ T5147] device macsec0 entered promiscuous mode [ 141.954856][ T5163] device syzkaller0 entered promiscuous mode [ 144.347005][ T24] audit: type=1400 audit(1720051610.129:152): avc: denied { create } for pid=5223 comm="syz.4.1833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ax25_socket permissive=1 [ 144.519753][ T24] audit: type=1400 audit(1720051610.149:153): avc: denied { create } for pid=5223 comm="syz.4.1833" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 146.738878][ T24] audit: type=1400 audit(1720051612.519:154): avc: denied { create } for pid=5297 comm="syz.3.1856" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 149.385712][ T5340] device syzkaller0 entered promiscuous mode [ 150.212571][ T5347] ªªªªªª: renamed from vlan0 [ 153.386838][ T24] audit: type=1400 audit(1720051619.169:155): avc: denied { create } for pid=5437 comm="syz.3.1907" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ipx_socket permissive=1 [ 154.265260][ T5482] device syzkaller0 entered promiscuous mode [ 155.069644][ T5505] syz.1.1929[5505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.069695][ T5505] syz.1.1929[5505] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 155.272638][ T5501] device pim6reg1 entered promiscuous mode [ 157.643589][ T5615] FAULT_INJECTION: forcing a failure. [ 157.643589][ T5615] name failslab, interval 1, probability 0, space 0, times 0 [ 157.656108][ T5615] CPU: 1 PID: 5615 Comm: syz.1.1968 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 157.667265][ T5615] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 157.677167][ T5615] Call Trace: [ 157.680298][ T5615] dump_stack_lvl+0x1e2/0x24b [ 157.684804][ T5615] ? bfq_pos_tree_add_move+0x43b/0x43b [ 157.690093][ T5615] ? ipgre_xmit+0x87a/0xc30 [ 157.694439][ T5615] ? __bpf_redirect+0x665/0xde0 [ 157.699120][ T5615] ? bpf_prog_da1e0ee5f8d5c8f5+0x55/0xf74 [ 157.704685][ T5615] ? bpf_test_run+0x40b/0xc20 [ 157.709192][ T5615] ? bpf_prog_test_run_skb+0xb6e/0x1410 [ 157.714580][ T5615] ? __x64_sys_bpf+0x7b/0x90 [ 157.718994][ T5615] ? do_syscall_64+0x34/0x70 [ 157.723429][ T5615] dump_stack+0x15/0x17 [ 157.727416][ T5615] should_fail+0x3c6/0x510 [ 157.731664][ T5615] ? dst_alloc+0x17d/0x590 [ 157.735919][ T5615] __should_failslab+0xa4/0xe0 [ 157.740520][ T5615] should_failslab+0x9/0x20 [ 157.744856][ T5615] kmem_cache_alloc+0x3d/0x2e0 [ 157.749456][ T5615] dst_alloc+0x17d/0x590 [ 157.753538][ T5615] ip_route_output_key_hash_rcu+0x129a/0x20b0 [ 157.759439][ T5615] ip_route_output_flow+0x144/0x310 [ 157.764469][ T5615] ? ipv4_sk_update_pmtu+0x1e40/0x1e40 [ 157.769764][ T5615] ip_tunnel_xmit+0xaa6/0x2760 [ 157.774368][ T5615] ? ip_tunnel_xmit+0x111/0x2760 [ 157.779135][ T5615] ? 0xffffffffa00243c4 [ 157.783130][ T5615] ? tnl_update_pmtu+0xba0/0xba0 [ 157.787911][ T5615] ? skb_network_protocol+0x564/0x7a0 [ 157.793110][ T5615] ? skb_push+0xa1/0x120 [ 157.797190][ T5615] ? arch_stack_walk+0xf3/0x140 [ 157.801878][ T5615] ? gre_build_header+0x233/0x6f0 [ 157.806738][ T5615] ipgre_xmit+0x87a/0xc30 [ 157.810903][ T5615] dev_hard_start_xmit+0x228/0x620 [ 157.815851][ T5615] __dev_queue_xmit+0x16f1/0x28e0 [ 157.820712][ T5615] ? dev_queue_xmit+0x20/0x20 [ 157.825224][ T5615] ? slab_post_alloc_hook+0x80/0x2f0 [ 157.830350][ T5615] ? __kasan_check_write+0x14/0x20 [ 157.835293][ T5615] ? skb_release_data+0x406/0x6f0 [ 157.840157][ T5615] ? __kasan_check_write+0x14/0x20 [ 157.845097][ T5615] ? pskb_expand_head+0xbcf/0x1180 [ 157.850044][ T5615] dev_queue_xmit+0x17/0x20 [ 157.854384][ T5615] __bpf_redirect+0x665/0xde0 [ 157.858904][ T5615] bpf_clone_redirect+0x24d/0x390 [ 157.863762][ T5615] bpf_prog_da1e0ee5f8d5c8f5+0x55/0xf74 [ 157.869138][ T5615] ? __kasan_slab_alloc+0xc3/0xe0 [ 157.874001][ T5615] ? __kasan_slab_alloc+0xb1/0xe0 [ 157.878860][ T5615] ? slab_post_alloc_hook+0x61/0x2f0 [ 157.883984][ T5615] ? kmem_cache_alloc+0x168/0x2e0 [ 157.888927][ T5615] ? __build_skb+0x2a/0x300 [ 157.893361][ T5615] ? build_skb+0x25/0x1e0 [ 157.897535][ T5615] ? bpf_prog_test_run_skb+0x388/0x1410 [ 157.902910][ T5615] ? __se_sys_bpf+0x5235/0x11cb0 [ 157.907675][ T5615] ? __x64_sys_bpf+0x7b/0x90 [ 157.912101][ T5615] ? do_syscall_64+0x34/0x70 [ 157.916529][ T5615] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 157.922440][ T5615] ? __kasan_check_read+0x11/0x20 [ 157.927292][ T5615] ? bpf_test_timer_continue+0x140/0x440 [ 157.932764][ T5615] bpf_test_run+0x40b/0xc20 [ 157.937102][ T5615] ? convert___skb_to_skb+0x570/0x570 [ 157.942339][ T5615] ? eth_type_trans+0x2e4/0x620 [ 157.946993][ T5615] ? eth_get_headlen+0x240/0x240 [ 157.951764][ T5615] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 157.957150][ T5615] ? convert___skb_to_skb+0x44/0x570 [ 157.962266][ T5615] ? memcpy+0x56/0x70 [ 157.966084][ T5615] bpf_prog_test_run_skb+0xb6e/0x1410 [ 157.971295][ T5615] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 157.977020][ T5615] ? __kasan_check_write+0x14/0x20 [ 157.981966][ T5615] ? fput_many+0x160/0x1b0 [ 157.986228][ T5615] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 157.991948][ T5615] __se_sys_bpf+0x5235/0x11cb0 [ 157.996549][ T5615] ? stack_trace_save+0x113/0x1c0 [ 158.001495][ T5615] ? terminate_walk+0x407/0x4f0 [ 158.006182][ T5615] ? stack_trace_snprint+0xf0/0xf0 [ 158.011130][ T5615] ? kmem_cache_free+0xa9/0x1e0 [ 158.015817][ T5615] ? kmem_cache_free+0xa9/0x1e0 [ 158.020502][ T5615] ? kasan_set_track+0x5d/0x70 [ 158.025118][ T5615] ? kasan_set_track+0x4b/0x70 [ 158.029711][ T5615] ? kasan_set_free_info+0x23/0x40 [ 158.034653][ T5615] ? ____kasan_slab_free+0x121/0x160 [ 158.039772][ T5615] ? __kasan_slab_free+0x11/0x20 [ 158.044548][ T5615] ? __x64_sys_bpf+0x90/0x90 [ 158.048967][ T5615] ? do_sys_openat2+0x5e1/0x6f0 [ 158.053658][ T5615] ? __x64_sys_openat+0x243/0x290 [ 158.058515][ T5615] ? do_syscall_64+0x34/0x70 [ 158.062945][ T5615] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 158.068845][ T5615] ? _kstrtoull+0x3a0/0x4a0 [ 158.073188][ T5615] ? kstrtouint_from_user+0x20a/0x2a0 [ 158.078478][ T5615] ? kstrtol_from_user+0x310/0x310 [ 158.083426][ T5615] ? memset+0x35/0x40 [ 158.087246][ T5615] ? __fsnotify_parent+0x4b9/0x6c0 [ 158.092195][ T5615] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 158.098786][ T5615] ? proc_fail_nth_write+0x20b/0x290 [ 158.103907][ T5615] ? proc_fail_nth_read+0x210/0x210 [ 158.108941][ T5615] ? security_file_permission+0x86/0xb0 [ 158.114322][ T5615] ? rw_verify_area+0x1c3/0x360 [ 158.119016][ T5615] ? slab_free_freelist_hook+0xc0/0x190 [ 158.124392][ T5615] ? preempt_count_add+0x92/0x1a0 [ 158.129250][ T5615] ? vfs_write+0x854/0xe70 [ 158.133504][ T5615] ? kernel_write+0x3d0/0x3d0 [ 158.138017][ T5615] ? __kasan_check_write+0x14/0x20 [ 158.142965][ T5615] ? mutex_lock+0xa5/0x110 [ 158.147216][ T5615] ? mutex_trylock+0xa0/0xa0 [ 158.151645][ T5615] ? __kasan_check_write+0x14/0x20 [ 158.156589][ T5615] ? fput_many+0x160/0x1b0 [ 158.160849][ T5615] ? debug_smp_processor_id+0x17/0x20 [ 158.166052][ T5615] __x64_sys_bpf+0x7b/0x90 [ 158.170304][ T5615] do_syscall_64+0x34/0x70 [ 158.174559][ T5615] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 158.180290][ T5615] RIP: 0033:0x7ff31a86dbd9 [ 158.184547][ T5615] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 158.203977][ T5615] RSP: 002b:00007ff319aef048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 158.212222][ T5615] RAX: ffffffffffffffda RBX: 00007ff31a9fbf60 RCX: 00007ff31a86dbd9 [ 158.220032][ T5615] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 158.227845][ T5615] RBP: 00007ff319aef0a0 R08: 0000000000000000 R09: 0000000000000000 [ 158.235653][ T5615] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 158.243468][ T5615] R13: 000000000000000b R14: 00007ff31a9fbf60 R15: 00007ffc909c9c28 [ 158.424046][ T5626] device wg2 left promiscuous mode [ 158.504582][ T5630] device wg2 entered promiscuous mode [ 158.797596][ T5652] device sit0 entered promiscuous mode [ 159.604240][ T5687] syz.0.1995[5687] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.604288][ T5687] syz.0.1995[5687] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 159.788790][ T5704] device sit0 left promiscuous mode [ 159.975272][ T5719] device sit0 entered promiscuous mode [ 160.804041][ T5754] device sit0 left promiscuous mode [ 161.049435][ T5754] device sit0 entered promiscuous mode [ 166.199026][ T5868] device syzkaller0 entered promiscuous mode [ 171.162826][ T5964] syz.4.2098[5964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 171.169818][ T5964] syz.4.2098[5964] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 173.786513][ T6034] device syzkaller0 entered promiscuous mode [ 174.231187][ T24] audit: type=1400 audit(1720051640.009:156): avc: denied { create } for pid=6043 comm="syz.1.2123" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 177.441407][ T6113] device veth0_vlan left promiscuous mode [ 177.511743][ T6113] device veth0_vlan entered promiscuous mode [ 177.801485][ T6127] device syzkaller0 entered promiscuous mode [ 180.237306][ T6171] FAULT_INJECTION: forcing a failure. [ 180.237306][ T6171] name failslab, interval 1, probability 0, space 0, times 0 [ 180.249818][ T6171] CPU: 1 PID: 6171 Comm: syz.4.2173 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 180.260805][ T6171] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 180.270698][ T6171] Call Trace: [ 180.273835][ T6171] dump_stack_lvl+0x1e2/0x24b [ 180.278341][ T6171] ? panic+0x812/0x812 [ 180.282257][ T6171] ? slab_post_alloc_hook+0x80/0x2f0 [ 180.287367][ T6171] ? bfq_pos_tree_add_move+0x43b/0x43b [ 180.292661][ T6171] ? __kasan_check_write+0x14/0x20 [ 180.297617][ T6171] dump_stack+0x15/0x17 [ 180.301599][ T6171] should_fail+0x3c6/0x510 [ 180.305857][ T6171] ? skb_clone+0x1de/0x370 [ 180.310107][ T6171] __should_failslab+0xa4/0xe0 [ 180.314708][ T6171] should_failslab+0x9/0x20 [ 180.319047][ T6171] kmem_cache_alloc+0x3d/0x2e0 [ 180.323646][ T6171] ? __bpf_redirect+0x673/0xde0 [ 180.328334][ T6171] skb_clone+0x1de/0x370 [ 180.332408][ T6171] bpf_clone_redirect+0xa6/0x390 [ 180.337187][ T6171] bpf_prog_da1e0ee5f8d5c8f5+0x55/0xd98 [ 180.342565][ T6171] ? __kasan_slab_alloc+0xc3/0xe0 [ 180.347425][ T6171] ? __kasan_slab_alloc+0xb1/0xe0 [ 180.352282][ T6171] ? slab_post_alloc_hook+0x61/0x2f0 [ 180.357403][ T6171] ? kmem_cache_alloc+0x168/0x2e0 [ 180.362263][ T6171] ? __build_skb+0x2a/0x300 [ 180.366604][ T6171] ? build_skb+0x25/0x1e0 [ 180.370771][ T6171] ? bpf_prog_test_run_skb+0x388/0x1410 [ 180.376152][ T6171] ? __se_sys_bpf+0x5235/0x11cb0 [ 180.380937][ T6171] ? __x64_sys_bpf+0x7b/0x90 [ 180.385354][ T6171] ? do_syscall_64+0x34/0x70 [ 180.389775][ T6171] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 180.395686][ T6171] ? __kasan_check_read+0x11/0x20 [ 180.400541][ T6171] ? bpf_test_timer_continue+0x140/0x440 [ 180.406010][ T6171] bpf_test_run+0x40b/0xc20 [ 180.410348][ T6171] ? convert___skb_to_skb+0x570/0x570 [ 180.415552][ T6171] ? eth_type_trans+0x2e4/0x620 [ 180.420241][ T6171] ? eth_get_headlen+0x240/0x240 [ 180.425014][ T6171] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 180.430393][ T6171] ? convert___skb_to_skb+0x44/0x570 [ 180.435515][ T6171] ? memcpy+0x56/0x70 [ 180.439337][ T6171] bpf_prog_test_run_skb+0xb6e/0x1410 [ 180.444545][ T6171] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 180.450274][ T6171] ? __kasan_check_write+0x14/0x20 [ 180.455218][ T6171] ? fput_many+0x160/0x1b0 [ 180.459475][ T6171] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 180.465198][ T6171] __se_sys_bpf+0x5235/0x11cb0 [ 180.469800][ T6171] ? stack_trace_save+0x113/0x1c0 [ 180.474659][ T6171] ? terminate_walk+0x407/0x4f0 [ 180.479343][ T6171] ? stack_trace_snprint+0xf0/0xf0 [ 180.484293][ T6171] ? kmem_cache_free+0xa9/0x1e0 [ 180.488978][ T6171] ? kmem_cache_free+0xa9/0x1e0 [ 180.493666][ T6171] ? kasan_set_track+0x5d/0x70 [ 180.498264][ T6171] ? kasan_set_track+0x4b/0x70 [ 180.502874][ T6171] ? kasan_set_free_info+0x23/0x40 [ 180.507812][ T6171] ? ____kasan_slab_free+0x121/0x160 [ 180.512933][ T6171] ? __kasan_slab_free+0x11/0x20 [ 180.517707][ T6171] ? __x64_sys_bpf+0x90/0x90 [ 180.522132][ T6171] ? do_sys_openat2+0x5e1/0x6f0 [ 180.526819][ T6171] ? __x64_sys_openat+0x243/0x290 [ 180.531679][ T6171] ? do_syscall_64+0x34/0x70 [ 180.536123][ T6171] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 180.542011][ T6171] ? _kstrtoull+0x3a0/0x4a0 [ 180.546351][ T6171] ? kstrtouint_from_user+0x20a/0x2a0 [ 180.551555][ T6171] ? kstrtol_from_user+0x310/0x310 [ 180.556503][ T6171] ? memset+0x35/0x40 [ 180.560318][ T6171] ? __fsnotify_parent+0x4b9/0x6c0 [ 180.565270][ T6171] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 180.571867][ T6171] ? proc_fail_nth_write+0x20b/0x290 [ 180.576986][ T6171] ? proc_fail_nth_read+0x210/0x210 [ 180.582019][ T6171] ? security_file_permission+0x86/0xb0 [ 180.587400][ T6171] ? rw_verify_area+0x1c3/0x360 [ 180.592085][ T6171] ? slab_free_freelist_hook+0xc0/0x190 [ 180.597555][ T6171] ? preempt_count_add+0x92/0x1a0 [ 180.602417][ T6171] ? vfs_write+0x854/0xe70 [ 180.606669][ T6171] ? kernel_write+0x3d0/0x3d0 [ 180.611183][ T6171] ? __kasan_check_write+0x14/0x20 [ 180.616127][ T6171] ? mutex_lock+0xa5/0x110 [ 180.620376][ T6171] ? mutex_trylock+0xa0/0xa0 [ 180.624808][ T6171] ? __kasan_check_write+0x14/0x20 [ 180.629753][ T6171] ? fput_many+0x160/0x1b0 [ 180.634010][ T6171] ? debug_smp_processor_id+0x17/0x20 [ 180.639215][ T6171] __x64_sys_bpf+0x7b/0x90 [ 180.643466][ T6171] do_syscall_64+0x34/0x70 [ 180.647719][ T6171] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 180.653447][ T6171] RIP: 0033:0x7f0fb79e4bd9 [ 180.657701][ T6171] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 180.677228][ T6171] RSP: 002b:00007f0fb6c66048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 180.685473][ T6171] RAX: ffffffffffffffda RBX: 00007f0fb7b72f60 RCX: 00007f0fb79e4bd9 [ 180.693282][ T6171] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 180.701188][ T6171] RBP: 00007f0fb6c660a0 R08: 0000000000000000 R09: 0000000000000000 [ 180.709002][ T6171] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 180.716813][ T6171] R13: 000000000000000b R14: 00007f0fb7b72f60 R15: 00007ffca7f86978 [ 186.232437][ T6378] device veth0_vlan left promiscuous mode [ 186.238640][ T6378] device veth0_vlan entered promiscuous mode [ 190.585456][ T6468] device sit0 left promiscuous mode [ 190.764355][ T6468] device sit0 entered promiscuous mode [ 191.632698][ T6499] syz.0.2288[6499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.632743][ T6499] syz.0.2288[6499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.656161][ T6499] syz.0.2288[6499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.689800][ T6499] syz.0.2288[6499] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 191.969373][ T6499] device syzkaller0 entered promiscuous mode [ 194.516508][ T6609] FAULT_INJECTION: forcing a failure. [ 194.516508][ T6609] name failslab, interval 1, probability 0, space 0, times 0 [ 194.528942][ T6609] CPU: 1 PID: 6609 Comm: syz.0.2325 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 194.540006][ T6609] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 194.549896][ T6609] Call Trace: [ 194.553036][ T6609] dump_stack_lvl+0x1e2/0x24b [ 194.557543][ T6609] ? bfq_pos_tree_add_move+0x43b/0x43b [ 194.562836][ T6609] dump_stack+0x15/0x17 [ 194.566826][ T6609] should_fail+0x3c6/0x510 [ 194.571081][ T6609] ? skb_ensure_writable+0x2d0/0x440 [ 194.576202][ T6609] __should_failslab+0xa4/0xe0 [ 194.580803][ T6609] should_failslab+0x9/0x20 [ 194.585144][ T6609] __kmalloc_track_caller+0x5f/0x320 [ 194.590262][ T6609] ? skb_ensure_writable+0x2d0/0x440 [ 194.595382][ T6609] pskb_expand_head+0x12b/0x1180 [ 194.600159][ T6609] ? __kasan_check_write+0x14/0x20 [ 194.605108][ T6609] skb_ensure_writable+0x2d0/0x440 [ 194.610047][ T6609] bpf_clone_redirect+0x117/0x390 [ 194.614908][ T6609] bpf_prog_da1e0ee5f8d5c8f5+0x55/0x830 [ 194.620285][ T6609] ? __kasan_slab_alloc+0xc3/0xe0 [ 194.625150][ T6609] ? __kasan_slab_alloc+0xb1/0xe0 [ 194.630009][ T6609] ? slab_post_alloc_hook+0x61/0x2f0 [ 194.635128][ T6609] ? kmem_cache_alloc+0x168/0x2e0 [ 194.639989][ T6609] ? __build_skb+0x2a/0x300 [ 194.644330][ T6609] ? build_skb+0x25/0x1e0 [ 194.648495][ T6609] ? bpf_prog_test_run_skb+0x388/0x1410 [ 194.653876][ T6609] ? __se_sys_bpf+0x5235/0x11cb0 [ 194.658649][ T6609] ? __x64_sys_bpf+0x7b/0x90 [ 194.663076][ T6609] ? do_syscall_64+0x34/0x70 [ 194.667502][ T6609] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 194.673415][ T6609] ? __kasan_check_read+0x11/0x20 [ 194.678264][ T6609] ? bpf_test_timer_continue+0x140/0x440 [ 194.683736][ T6609] bpf_test_run+0x40b/0xc20 [ 194.688074][ T6609] ? convert___skb_to_skb+0x570/0x570 [ 194.693304][ T6609] ? eth_type_trans+0x2e4/0x620 [ 194.697976][ T6609] ? eth_get_headlen+0x240/0x240 [ 194.702745][ T6609] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 194.708129][ T6609] ? convert___skb_to_skb+0x44/0x570 [ 194.713247][ T6609] ? memcpy+0x56/0x70 [ 194.717066][ T6609] bpf_prog_test_run_skb+0xb6e/0x1410 [ 194.722275][ T6609] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 194.728000][ T6609] ? __kasan_check_write+0x14/0x20 [ 194.732945][ T6609] ? fput_many+0x160/0x1b0 [ 194.737195][ T6609] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 194.742926][ T6609] __se_sys_bpf+0x5235/0x11cb0 [ 194.747526][ T6609] ? stack_trace_save+0x113/0x1c0 [ 194.752384][ T6609] ? terminate_walk+0x407/0x4f0 [ 194.757086][ T6609] ? stack_trace_snprint+0xf0/0xf0 [ 194.762020][ T6609] ? kmem_cache_free+0xa9/0x1e0 [ 194.766704][ T6609] ? kmem_cache_free+0xa9/0x1e0 [ 194.771393][ T6609] ? kasan_set_track+0x5d/0x70 [ 194.775995][ T6609] ? kasan_set_track+0x4b/0x70 [ 194.780592][ T6609] ? kasan_set_free_info+0x23/0x40 [ 194.785542][ T6609] ? ____kasan_slab_free+0x121/0x160 [ 194.790664][ T6609] ? __kasan_slab_free+0x11/0x20 [ 194.795437][ T6609] ? __x64_sys_bpf+0x90/0x90 [ 194.799858][ T6609] ? do_sys_openat2+0x5e1/0x6f0 [ 194.804544][ T6609] ? __x64_sys_openat+0x243/0x290 [ 194.809411][ T6609] ? do_syscall_64+0x34/0x70 [ 194.813834][ T6609] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 194.819736][ T6609] ? _kstrtoull+0x3a0/0x4a0 [ 194.824075][ T6609] ? kstrtouint_from_user+0x20a/0x2a0 [ 194.829282][ T6609] ? kstrtol_from_user+0x310/0x310 [ 194.834235][ T6609] ? memset+0x35/0x40 [ 194.838049][ T6609] ? __fsnotify_parent+0x4b9/0x6c0 [ 194.843001][ T6609] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 194.849590][ T6609] ? proc_fail_nth_write+0x20b/0x290 [ 194.854713][ T6609] ? proc_fail_nth_read+0x210/0x210 [ 194.859746][ T6609] ? security_file_permission+0x86/0xb0 [ 194.865132][ T6609] ? rw_verify_area+0x1c3/0x360 [ 194.869810][ T6609] ? slab_free_freelist_hook+0xc0/0x190 [ 194.875194][ T6609] ? preempt_count_add+0x92/0x1a0 [ 194.880141][ T6609] ? vfs_write+0x854/0xe70 [ 194.884413][ T6609] ? kernel_write+0x3d0/0x3d0 [ 194.888909][ T6609] ? __kasan_check_write+0x14/0x20 [ 194.893854][ T6609] ? mutex_lock+0xa5/0x110 [ 194.898109][ T6609] ? mutex_trylock+0xa0/0xa0 [ 194.902538][ T6609] ? __kasan_check_write+0x14/0x20 [ 194.907486][ T6609] ? fput_many+0x160/0x1b0 [ 194.911742][ T6609] ? debug_smp_processor_id+0x17/0x20 [ 194.916944][ T6609] __x64_sys_bpf+0x7b/0x90 [ 194.921197][ T6609] do_syscall_64+0x34/0x70 [ 194.925449][ T6609] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 194.931176][ T6609] RIP: 0033:0x7feb3f005bd9 [ 194.935428][ T6609] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 194.954867][ T6609] RSP: 002b:00007feb3e287048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 194.963112][ T6609] RAX: ffffffffffffffda RBX: 00007feb3f193f60 RCX: 00007feb3f005bd9 [ 194.970920][ T6609] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 194.978732][ T6609] RBP: 00007feb3e2870a0 R08: 0000000000000000 R09: 0000000000000000 [ 194.986544][ T6609] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 194.994358][ T6609] R13: 000000000000000b R14: 00007feb3f193f60 R15: 00007ffe0980f058 [ 197.332344][ T6688] device syzkaller0 entered promiscuous mode [ 201.674512][ T6825] device syzkaller0 entered promiscuous mode [ 202.411080][ T6849] device syzkaller0 entered promiscuous mode [ 203.737475][ T6878] device syzkaller0 entered promiscuous mode [ 204.112792][ T6898] syz.4.2424[6898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 204.112927][ T6898] syz.4.2424[6898] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 207.597678][ T6972] device veth1_macvtap left promiscuous mode [ 208.552954][ T7020] device pim6reg1 entered promiscuous mode [ 208.664091][ T7025] syz.2.2465[7025] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 208.666134][ T7025] syz.2.2465[7025] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.019854][ T7231] FAULT_INJECTION: forcing a failure. [ 212.019854][ T7231] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 212.049955][ T7231] CPU: 1 PID: 7231 Comm: syz.1.2539 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 212.061034][ T7231] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 212.070925][ T7231] Call Trace: [ 212.074062][ T7231] dump_stack_lvl+0x1e2/0x24b [ 212.078568][ T7231] ? bfq_pos_tree_add_move+0x43b/0x43b [ 212.083862][ T7231] dump_stack+0x15/0x17 [ 212.087849][ T7231] should_fail+0x3c6/0x510 [ 212.092106][ T7231] should_fail_alloc_page+0x52/0x60 [ 212.097141][ T7231] __alloc_pages_nodemask+0x1b3/0xaf0 [ 212.102347][ T7231] ? gfp_pfmemalloc_allowed+0x120/0x120 [ 212.107727][ T7231] ? sysvec_apic_timer_interrupt+0xcb/0xe0 [ 212.113368][ T7231] ? __vmalloc_node_range+0x3ee/0x7c0 [ 212.118575][ T7231] __vmalloc_node_range+0x36c/0x7c0 [ 212.123617][ T7231] bpf_map_area_alloc+0xd9/0xf0 [ 212.128295][ T7231] ? array_map_alloc+0x319/0x7c0 [ 212.133067][ T7231] array_map_alloc+0x319/0x7c0 [ 212.137676][ T7231] ? irq_exit_rcu+0x9/0x10 [ 212.141924][ T7231] ? bpf_percpu_array_update+0x6d0/0x6d0 [ 212.147390][ T7231] ? __se_sys_bpf+0x4215/0x11cb0 [ 212.152162][ T7231] ? fd_array_map_alloc_check+0x250/0x310 [ 212.157718][ T7231] __se_sys_bpf+0x620f/0x11cb0 [ 212.162318][ T7231] ? perf_event_output_forward+0x14e/0x1b0 [ 212.167958][ T7231] ? perf_prepare_sample+0x1af0/0x1af0 [ 212.173255][ T7231] ? __x64_sys_bpf+0x90/0x90 [ 212.177680][ T7231] ? __this_cpu_preempt_check+0x13/0x20 [ 212.183063][ T7231] ? __perf_event_account_interrupt+0x18f/0x2c0 [ 212.189136][ T7231] ? hrtimer_forward+0x1a6/0x2c0 [ 212.193911][ T7231] ? perf_swevent_hrtimer+0x4b8/0x560 [ 212.199117][ T7231] ? cpu_clock_event_read+0x50/0x50 [ 212.204157][ T7231] ? timerqueue_add+0x24c/0x270 [ 212.208837][ T7231] ? enqueue_hrtimer+0xad/0x200 [ 212.213524][ T7231] ? __hrtimer_run_queues+0x438/0xa50 [ 212.218733][ T7231] ? __hrtimer_run_queues+0x9ea/0xa50 [ 212.223941][ T7231] ? ktime_get+0x10e/0x140 [ 212.228191][ T7231] ? lapic_next_event+0x5f/0x70 [ 212.232878][ T7231] ? clockevents_program_event+0x214/0x2c0 [ 212.238523][ T7231] ? hrtimer_interrupt+0x6a8/0x8b0 [ 212.243472][ T7231] ? debug_smp_processor_id+0x17/0x20 [ 212.248674][ T7231] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 212.254578][ T7231] __x64_sys_bpf+0x7b/0x90 [ 212.258831][ T7231] do_syscall_64+0x34/0x70 [ 212.263084][ T7231] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 212.268810][ T7231] RIP: 0033:0x7ff31a86dbd9 [ 212.273067][ T7231] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 212.292501][ T7231] RSP: 002b:00007ff319aef048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 212.300746][ T7231] RAX: ffffffffffffffda RBX: 00007ff31a9fbf60 RCX: 00007ff31a86dbd9 [ 212.308561][ T7231] RDX: 0000000000000048 RSI: 0000000020000040 RDI: 0000000000000000 [ 212.316367][ T7231] RBP: 00007ff319aef0a0 R08: 0000000000000000 R09: 0000000000000000 [ 212.324181][ T7231] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 212.332077][ T7231] R13: 000000000000000b R14: 00007ff31a9fbf60 R15: 00007ffc909c9c28 [ 212.976612][ T7304] syz.4.2566[7304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 212.976656][ T7304] syz.4.2566[7304] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.313131][ T7332] bridge0: port 3(vlan1) entered blocking state [ 213.350589][ T7332] bridge0: port 3(vlan1) entered disabled state [ 213.357540][ T7332] device vlan1 entered promiscuous mode [ 213.370821][ T7332] bridge0: port 3(vlan1) entered blocking state [ 213.376909][ T7332] bridge0: port 3(vlan1) entered forwarding state [ 213.792674][ T7421] syz.2.2601[7421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.792727][ T7421] syz.2.2601[7421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.887892][ T7421] syz.2.2601[7421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 213.942023][ T7432] device pim6reg1 entered promiscuous mode [ 213.984204][ T7421] syz.2.2601[7421] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.158983][ T7451] syz.4.2615[7451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.186809][ T7451] syz.4.2615[7451] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 214.240880][ T7452] device syzkaller0 entered promiscuous mode [ 215.308794][ T7522] FAULT_INJECTION: forcing a failure. [ 215.308794][ T7522] name failslab, interval 1, probability 0, space 0, times 0 [ 215.321225][ T7522] CPU: 0 PID: 7522 Comm: syz.1.2643 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 215.332304][ T7522] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 215.342189][ T7522] Call Trace: [ 215.345325][ T7522] dump_stack_lvl+0x1e2/0x24b [ 215.349829][ T7522] ? panic+0x812/0x812 [ 215.353743][ T7522] ? slab_post_alloc_hook+0x80/0x2f0 [ 215.358859][ T7522] ? bfq_pos_tree_add_move+0x43b/0x43b [ 215.364157][ T7522] ? __kasan_check_write+0x14/0x20 [ 215.369097][ T7522] dump_stack+0x15/0x17 [ 215.373089][ T7522] should_fail+0x3c6/0x510 [ 215.377341][ T7522] ? skb_clone+0x1de/0x370 [ 215.381596][ T7522] __should_failslab+0xa4/0xe0 [ 215.386197][ T7522] should_failslab+0x9/0x20 [ 215.390540][ T7522] kmem_cache_alloc+0x3d/0x2e0 [ 215.395135][ T7522] ? __bpf_redirect+0x673/0xde0 [ 215.399821][ T7522] skb_clone+0x1de/0x370 [ 215.403901][ T7522] bpf_clone_redirect+0xa6/0x390 [ 215.408676][ T7522] bpf_prog_da1e0ee5f8d5c8f5+0x55/0x834 [ 215.414054][ T7522] ? __kasan_slab_alloc+0xc3/0xe0 [ 215.418916][ T7522] ? __kasan_slab_alloc+0xb1/0xe0 [ 215.423776][ T7522] ? slab_post_alloc_hook+0x61/0x2f0 [ 215.428896][ T7522] ? kmem_cache_alloc+0x168/0x2e0 [ 215.433755][ T7522] ? __build_skb+0x2a/0x300 [ 215.438093][ T7522] ? build_skb+0x25/0x1e0 [ 215.442259][ T7522] ? bpf_prog_test_run_skb+0x388/0x1410 [ 215.447643][ T7522] ? __se_sys_bpf+0x5235/0x11cb0 [ 215.452413][ T7522] ? __x64_sys_bpf+0x7b/0x90 [ 215.456841][ T7522] ? do_syscall_64+0x34/0x70 [ 215.461273][ T7522] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 215.467183][ T7522] ? __kasan_check_read+0x11/0x20 [ 215.472033][ T7522] ? bpf_test_timer_continue+0x140/0x440 [ 215.477506][ T7522] bpf_test_run+0x40b/0xc20 [ 215.481839][ T7522] ? convert___skb_to_skb+0x570/0x570 [ 215.487043][ T7522] ? eth_type_trans+0x2e4/0x620 [ 215.491734][ T7522] ? eth_get_headlen+0x240/0x240 [ 215.496509][ T7522] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 215.501887][ T7522] ? convert___skb_to_skb+0x44/0x570 [ 215.507005][ T7522] ? memcpy+0x56/0x70 [ 215.510818][ T7522] bpf_prog_test_run_skb+0xb6e/0x1410 [ 215.516045][ T7522] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 215.521766][ T7522] ? __kasan_check_write+0x14/0x20 [ 215.526711][ T7522] ? fput_many+0x160/0x1b0 [ 215.530959][ T7522] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 215.536694][ T7522] __se_sys_bpf+0x5235/0x11cb0 [ 215.541290][ T7522] ? stack_trace_save+0x113/0x1c0 [ 215.546153][ T7522] ? terminate_walk+0x407/0x4f0 [ 215.550832][ T7522] ? stack_trace_snprint+0xf0/0xf0 [ 215.555782][ T7522] ? kmem_cache_free+0xa9/0x1e0 [ 215.560464][ T7522] ? kmem_cache_free+0xa9/0x1e0 [ 215.565151][ T7522] ? kasan_set_track+0x5d/0x70 [ 215.569750][ T7522] ? kasan_set_track+0x4b/0x70 [ 215.574351][ T7522] ? kasan_set_free_info+0x23/0x40 [ 215.579297][ T7522] ? ____kasan_slab_free+0x121/0x160 [ 215.584420][ T7522] ? __kasan_slab_free+0x11/0x20 [ 215.589201][ T7522] ? __x64_sys_bpf+0x90/0x90 [ 215.593621][ T7522] ? do_sys_openat2+0x5e1/0x6f0 [ 215.598306][ T7522] ? __x64_sys_openat+0x243/0x290 [ 215.603169][ T7522] ? do_syscall_64+0x34/0x70 [ 215.607593][ T7522] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 215.613500][ T7522] ? _kstrtoull+0x3a0/0x4a0 [ 215.617835][ T7522] ? kstrtouint_from_user+0x20a/0x2a0 [ 215.623041][ T7522] ? kstrtol_from_user+0x310/0x310 [ 215.627989][ T7522] ? memset+0x35/0x40 [ 215.631808][ T7522] ? __fsnotify_parent+0x4b9/0x6c0 [ 215.636757][ T7522] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 215.643351][ T7522] ? proc_fail_nth_write+0x20b/0x290 [ 215.648474][ T7522] ? proc_fail_nth_read+0x210/0x210 [ 215.653507][ T7522] ? security_file_permission+0x86/0xb0 [ 215.658888][ T7522] ? rw_verify_area+0x1c3/0x360 [ 215.663573][ T7522] ? slab_free_freelist_hook+0xc0/0x190 [ 215.668954][ T7522] ? preempt_count_add+0x92/0x1a0 [ 215.673816][ T7522] ? vfs_write+0x854/0xe70 [ 215.678071][ T7522] ? kernel_write+0x3d0/0x3d0 [ 215.682582][ T7522] ? __kasan_check_write+0x14/0x20 [ 215.687529][ T7522] ? mutex_lock+0xa5/0x110 [ 215.691778][ T7522] ? mutex_trylock+0xa0/0xa0 [ 215.696209][ T7522] ? __kasan_check_write+0x14/0x20 [ 215.701154][ T7522] ? fput_many+0x160/0x1b0 [ 215.705413][ T7522] ? debug_smp_processor_id+0x17/0x20 [ 215.710614][ T7522] __x64_sys_bpf+0x7b/0x90 [ 215.714867][ T7522] do_syscall_64+0x34/0x70 [ 215.719121][ T7522] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 215.724847][ T7522] RIP: 0033:0x7ff31a86dbd9 [ 215.729101][ T7522] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 215.748548][ T7522] RSP: 002b:00007ff319aef048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 215.756786][ T7522] RAX: ffffffffffffffda RBX: 00007ff31a9fbf60 RCX: 00007ff31a86dbd9 [ 215.764600][ T7522] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 215.772412][ T7522] RBP: 00007ff319aef0a0 R08: 0000000000000000 R09: 0000000000000000 [ 215.780224][ T7522] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 215.788029][ T7522] R13: 000000000000000b R14: 00007ff31a9fbf60 R15: 00007ffc909c9c28 [ 218.654270][ T24] audit: type=1400 audit(1720051684.439:157): avc: denied { create } for pid=7685 comm="syz.1.2705" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_crypto_socket permissive=1 [ 221.171371][ T7797] syz.2.2749[7797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 221.175544][ T7797] syz.2.2749[7797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 222.724185][ T7812] bridge0: port 1(bridge_slave_0) entered blocking state [ 222.750018][ T7812] bridge0: port 1(bridge_slave_0) entered disabled state [ 222.757659][ T7812] device bridge_slave_0 entered promiscuous mode [ 222.900012][ T7812] bridge0: port 2(bridge_slave_1) entered blocking state [ 222.907127][ T7812] bridge0: port 2(bridge_slave_1) entered disabled state [ 222.915048][ T7812] device bridge_slave_1 entered promiscuous mode [ 223.803752][ T24] audit: type=1400 audit(1720051689.589:158): avc: denied { create } for pid=7812 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 223.832949][ T24] audit: type=1400 audit(1720051689.609:159): avc: denied { write } for pid=7812 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 223.835949][ T7876] device syzkaller0 entered promiscuous mode [ 223.853277][ T24] audit: type=1400 audit(1720051689.609:160): avc: denied { read } for pid=7812 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 224.142027][ T7880] device syzkaller0 entered promiscuous mode [ 224.150307][ T2033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 224.157877][ T2033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 224.165207][ T2033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 224.173824][ T2033] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 224.181843][ T2033] bridge0: port 1(bridge_slave_0) entered blocking state [ 224.188688][ T2033] bridge0: port 1(bridge_slave_0) entered forwarding state [ 224.196140][ T2033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 224.206646][ T2033] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 224.214653][ T2033] bridge0: port 2(bridge_slave_1) entered blocking state [ 224.221489][ T2033] bridge0: port 2(bridge_slave_1) entered forwarding state [ 224.228687][ T2033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 224.236700][ T2033] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 224.381100][ T2033] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 224.541649][ T2028] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 224.549533][ T2028] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 224.668531][ T2032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 224.676741][ T2032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 224.685147][ T2032] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 224.692798][ T2032] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 224.701356][ T7812] device veth0_vlan entered promiscuous mode [ 224.735810][ T2032] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 224.743144][ T2032] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 224.752264][ T7812] device veth1_macvtap entered promiscuous mode [ 224.785442][ T7899] syz.3.2785[7899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.785492][ T7899] syz.3.2785[7899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.797204][ T2033] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 224.825210][ T2033] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 224.833954][ T2033] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 224.873774][ T7899] syz.3.2785[7899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.873825][ T7899] syz.3.2785[7899] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 224.885620][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 224.905411][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 224.918192][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 224.930506][ T1018] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 225.065937][ T7924] device pim6reg1 entered promiscuous mode [ 225.118929][ T7932] syz.3.2798[7932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.119027][ T7932] syz.3.2798[7932] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 225.831533][ T317] device bridge_slave_1 left promiscuous mode [ 225.850799][ T317] bridge0: port 2(bridge_slave_1) entered disabled state [ 225.858777][ T317] device bridge_slave_0 left promiscuous mode [ 225.884893][ T317] bridge0: port 1(bridge_slave_0) entered disabled state [ 226.223466][ T7955] device syzkaller0 entered promiscuous mode [ 227.306095][ T8049] device syzkaller0 entered promiscuous mode [ 227.730023][ T8081] device pim6reg1 entered promiscuous mode [ 228.173676][ T8111] syz.1.2863[8111] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 228.173722][ T8111] syz.1.2863[8111] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 230.557938][ T8218] device wg2 entered promiscuous mode [ 231.971541][ T8247] FAULT_INJECTION: forcing a failure. [ 231.971541][ T8247] name failslab, interval 1, probability 0, space 0, times 0 [ 231.983981][ T8247] CPU: 0 PID: 8247 Comm: syz.3.2916 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 231.995052][ T8247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 232.004941][ T8247] Call Trace: [ 232.008079][ T8247] dump_stack_lvl+0x1e2/0x24b [ 232.012592][ T8247] ? bfq_pos_tree_add_move+0x43b/0x43b [ 232.017886][ T8247] dump_stack+0x15/0x17 [ 232.021872][ T8247] should_fail+0x3c6/0x510 [ 232.026128][ T8247] ? skb_ensure_writable+0x2d0/0x440 [ 232.031245][ T8247] __should_failslab+0xa4/0xe0 [ 232.035849][ T8247] should_failslab+0x9/0x20 [ 232.040191][ T8247] __kmalloc_track_caller+0x5f/0x320 [ 232.045307][ T8247] ? skb_ensure_writable+0x2d0/0x440 [ 232.050517][ T8247] pskb_expand_head+0x12b/0x1180 [ 232.055285][ T8247] ? __kasan_check_write+0x14/0x20 [ 232.060232][ T8247] skb_ensure_writable+0x2d0/0x440 [ 232.065179][ T8247] bpf_clone_redirect+0x117/0x390 [ 232.070040][ T8247] bpf_prog_da1e0ee5f8d5c8f5+0x55/0x8c4 [ 232.075419][ T8247] ? __kasan_slab_alloc+0xc3/0xe0 [ 232.080276][ T8247] ? __kasan_slab_alloc+0xb1/0xe0 [ 232.085140][ T8247] ? slab_post_alloc_hook+0x61/0x2f0 [ 232.090259][ T8247] ? kmem_cache_alloc+0x168/0x2e0 [ 232.095119][ T8247] ? __build_skb+0x2a/0x300 [ 232.099456][ T8247] ? build_skb+0x25/0x1e0 [ 232.103625][ T8247] ? bpf_prog_test_run_skb+0x388/0x1410 [ 232.109006][ T8247] ? __se_sys_bpf+0x5235/0x11cb0 [ 232.113779][ T8247] ? __x64_sys_bpf+0x7b/0x90 [ 232.118205][ T8247] ? do_syscall_64+0x34/0x70 [ 232.122634][ T8247] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 232.128540][ T8247] ? __kasan_check_read+0x11/0x20 [ 232.133394][ T8247] ? bpf_test_timer_continue+0x140/0x440 [ 232.138862][ T8247] bpf_test_run+0x40b/0xc20 [ 232.143204][ T8247] ? convert___skb_to_skb+0x570/0x570 [ 232.148417][ T8247] ? eth_type_trans+0x2e4/0x620 [ 232.153096][ T8247] ? eth_get_headlen+0x240/0x240 [ 232.157867][ T8247] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 232.163249][ T8247] ? convert___skb_to_skb+0x44/0x570 [ 232.168370][ T8247] ? memcpy+0x56/0x70 [ 232.172189][ T8247] bpf_prog_test_run_skb+0xb6e/0x1410 [ 232.177402][ T8247] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 232.183128][ T8247] ? __kasan_check_write+0x14/0x20 [ 232.188083][ T8247] ? fput_many+0x160/0x1b0 [ 232.192325][ T8247] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 232.198054][ T8247] __se_sys_bpf+0x5235/0x11cb0 [ 232.202656][ T8247] ? stack_trace_save+0x113/0x1c0 [ 232.207515][ T8247] ? terminate_walk+0x407/0x4f0 [ 232.212199][ T8247] ? stack_trace_snprint+0xf0/0xf0 [ 232.217150][ T8247] ? kmem_cache_free+0xa9/0x1e0 [ 232.221834][ T8247] ? kmem_cache_free+0xa9/0x1e0 [ 232.226521][ T8247] ? kasan_set_track+0x5d/0x70 [ 232.231119][ T8247] ? kasan_set_track+0x4b/0x70 [ 232.235721][ T8247] ? kasan_set_free_info+0x23/0x40 [ 232.240666][ T8247] ? ____kasan_slab_free+0x121/0x160 [ 232.245794][ T8247] ? __kasan_slab_free+0x11/0x20 [ 232.250564][ T8247] ? __x64_sys_bpf+0x90/0x90 [ 232.254987][ T8247] ? do_sys_openat2+0x5e1/0x6f0 [ 232.259674][ T8247] ? __x64_sys_openat+0x243/0x290 [ 232.264622][ T8247] ? do_syscall_64+0x34/0x70 [ 232.269049][ T8247] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 232.274953][ T8247] ? _kstrtoull+0x3a0/0x4a0 [ 232.279291][ T8247] ? kstrtouint_from_user+0x20a/0x2a0 [ 232.284500][ T8247] ? kstrtol_from_user+0x310/0x310 [ 232.289445][ T8247] ? memset+0x35/0x40 [ 232.293360][ T8247] ? __fsnotify_parent+0x4b9/0x6c0 [ 232.298384][ T8247] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 232.304980][ T8247] ? proc_fail_nth_write+0x20b/0x290 [ 232.310194][ T8247] ? proc_fail_nth_read+0x210/0x210 [ 232.315398][ T8247] ? security_file_permission+0x86/0xb0 [ 232.320774][ T8247] ? rw_verify_area+0x1c3/0x360 [ 232.325462][ T8247] ? preempt_count_add+0x92/0x1a0 [ 232.330319][ T8247] ? vfs_write+0x854/0xe70 [ 232.334578][ T8247] ? kernel_write+0x3d0/0x3d0 [ 232.339087][ T8247] ? __kasan_check_write+0x14/0x20 [ 232.344036][ T8247] ? mutex_lock+0xa5/0x110 [ 232.348286][ T8247] ? mutex_trylock+0xa0/0xa0 [ 232.352714][ T8247] ? __kasan_check_write+0x14/0x20 [ 232.357662][ T8247] ? fput_many+0x160/0x1b0 [ 232.361919][ T8247] ? debug_smp_processor_id+0x17/0x20 [ 232.367124][ T8247] __x64_sys_bpf+0x7b/0x90 [ 232.371376][ T8247] do_syscall_64+0x34/0x70 [ 232.375628][ T8247] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 232.381354][ T8247] RIP: 0033:0x7f0e6626abd9 [ 232.385610][ T8247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 232.405048][ T8247] RSP: 002b:00007f0e654ec048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 232.413381][ T8247] RAX: ffffffffffffffda RBX: 00007f0e663f8f60 RCX: 00007f0e6626abd9 [ 232.421191][ T8247] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 232.429003][ T8247] RBP: 00007f0e654ec0a0 R08: 0000000000000000 R09: 0000000000000000 [ 232.436813][ T8247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 232.444624][ T8247] R13: 000000000000000b R14: 00007f0e663f8f60 R15: 00007fff8e33c208 [ 232.947461][ T8258] syz.1.2919[8258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.947511][ T8258] syz.1.2919[8258] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.958952][ T8259] syz.1.2919[8259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 232.970228][ T8259] syz.1.2919[8259] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 233.416090][ T8281] device syzkaller0 entered promiscuous mode [ 233.505937][ T8287] device syzkaller0 entered promiscuous mode [ 234.241430][ T8347] device syzkaller0 entered promiscuous mode [ 239.602086][ T8493] FAULT_INJECTION: forcing a failure. [ 239.602086][ T8493] name failslab, interval 1, probability 0, space 0, times 0 [ 239.616367][ T8493] CPU: 1 PID: 8493 Comm: syz.0.3004 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 239.627448][ T8493] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 239.637339][ T8493] Call Trace: [ 239.640475][ T8493] dump_stack_lvl+0x1e2/0x24b [ 239.644986][ T8493] ? panic+0x812/0x812 [ 239.648887][ T8493] ? bfq_pos_tree_add_move+0x43b/0x43b [ 239.654262][ T8493] ? kstrtouint_from_user+0x20a/0x2a0 [ 239.659467][ T8493] ? kstrtol_from_user+0x310/0x310 [ 239.664419][ T8493] dump_stack+0x15/0x17 [ 239.668407][ T8493] should_fail+0x3c6/0x510 [ 239.672663][ T8493] ? kernfs_fop_write_iter+0x151/0x410 [ 239.677957][ T8493] __should_failslab+0xa4/0xe0 [ 239.682575][ T8493] should_failslab+0x9/0x20 [ 239.686901][ T8493] __kmalloc+0x60/0x330 [ 239.690892][ T8493] ? security_file_permission+0x7b/0xb0 [ 239.696286][ T8493] kernfs_fop_write_iter+0x151/0x410 [ 239.701392][ T8493] vfs_write+0xb55/0xe70 [ 239.705471][ T8493] ? kernel_write+0x3d0/0x3d0 [ 239.709981][ T8493] ? mutex_trylock+0xa0/0xa0 [ 239.714411][ T8493] ? __fdget_pos+0x2e7/0x3a0 [ 239.718833][ T8493] ? ksys_write+0x77/0x2c0 [ 239.723090][ T8493] ksys_write+0x199/0x2c0 [ 239.727257][ T8493] ? __ia32_sys_read+0x90/0x90 [ 239.731873][ T8493] ? debug_smp_processor_id+0x17/0x20 [ 239.737063][ T8493] __x64_sys_write+0x7b/0x90 [ 239.741487][ T8493] do_syscall_64+0x34/0x70 [ 239.745754][ T8493] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 239.751466][ T8493] RIP: 0033:0x7feb3f005bd9 [ 239.755722][ T8493] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 239.775163][ T8493] RSP: 002b:00007feb3e287048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 239.783408][ T8493] RAX: ffffffffffffffda RBX: 00007feb3f193f60 RCX: 00007feb3f005bd9 [ 239.791217][ T8493] RDX: 0000000000000012 RSI: 0000000020000200 RDI: 0000000000000007 [ 239.799029][ T8493] RBP: 00007feb3e2870a0 R08: 0000000000000000 R09: 0000000000000000 [ 239.806838][ T8493] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 239.814648][ T8493] R13: 000000000000000b R14: 00007feb3f193f60 R15: 00007ffe0980f058 [ 240.902372][ T8537] Â: renamed from pim6reg1 [ 242.428887][ T8567] device syzkaller0 entered promiscuous mode [ 243.612842][ T8623] device veth1_macvtap left promiscuous mode [ 245.090346][ T8688] device pim6reg1 entered promiscuous mode [ 245.300405][ T8701] device veth0_vlan left promiscuous mode [ 245.306526][ T8701] device veth0_vlan entered promiscuous mode [ 246.514705][ T24] audit: type=1400 audit(1720051712.299:161): avc: denied { create } for pid=8744 comm="syz.2.3100" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 246.667409][ T24] audit: type=1400 audit(1720051712.449:162): avc: denied { append } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 246.964579][ T24] audit: type=1400 audit(1720051712.449:163): avc: denied { open } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 247.308259][ T24] audit: type=1400 audit(1720051712.449:164): avc: denied { getattr } for pid=75 comm="syslogd" path="/tmp/messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 247.414890][ T8756] device syzkaller0 entered promiscuous mode [ 252.658077][ T8989] FAULT_INJECTION: forcing a failure. [ 252.658077][ T8989] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 252.671101][ T8989] CPU: 0 PID: 8989 Comm: syz.3.3184 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 252.682177][ T8989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 252.692067][ T8989] Call Trace: [ 252.695204][ T8989] dump_stack_lvl+0x1e2/0x24b [ 252.699709][ T8989] ? bfq_pos_tree_add_move+0x43b/0x43b [ 252.704999][ T8989] ? do_syscall_64+0x34/0x70 [ 252.709428][ T8989] dump_stack+0x15/0x17 [ 252.713419][ T8989] should_fail+0x3c6/0x510 [ 252.717670][ T8989] should_fail_usercopy+0x1a/0x20 [ 252.722538][ T8989] _copy_from_iter+0x22c/0xd10 [ 252.727133][ T8989] ? copyout_mc+0x90/0x90 [ 252.731298][ T8989] ? __check_object_size+0x2e6/0x3c0 [ 252.736433][ T8989] kernfs_fop_write_iter+0x1a0/0x410 [ 252.741542][ T8989] vfs_write+0xb55/0xe70 [ 252.745622][ T8989] ? kernel_write+0x3d0/0x3d0 [ 252.750137][ T8989] ? mutex_trylock+0xa0/0xa0 [ 252.754562][ T8989] ? __fdget_pos+0x2e7/0x3a0 [ 252.758984][ T8989] ? ksys_write+0x77/0x2c0 [ 252.763241][ T8989] ksys_write+0x199/0x2c0 [ 252.767405][ T8989] ? __ia32_sys_read+0x90/0x90 [ 252.772006][ T8989] ? debug_smp_processor_id+0x17/0x20 [ 252.777210][ T8989] __x64_sys_write+0x7b/0x90 [ 252.781633][ T8989] do_syscall_64+0x34/0x70 [ 252.785893][ T8989] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 252.791618][ T8989] RIP: 0033:0x7f0e6626abd9 [ 252.795871][ T8989] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 252.815310][ T8989] RSP: 002b:00007f0e654ec048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 252.823815][ T8989] RAX: ffffffffffffffda RBX: 00007f0e663f8f60 RCX: 00007f0e6626abd9 [ 252.831627][ T8989] RDX: 0000000000000012 RSI: 0000000020000200 RDI: 0000000000000007 [ 252.839438][ T8989] RBP: 00007f0e654ec0a0 R08: 0000000000000000 R09: 0000000000000000 [ 252.847248][ T8989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 252.855061][ T8989] R13: 000000000000000b R14: 00007f0e663f8f60 R15: 00007fff8e33c208 [ 252.933605][ T8999] syz.0.3190[8999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 252.933661][ T8999] syz.0.3190[8999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 253.975711][ T9057] device veth1_macvtap left promiscuous mode [ 257.787122][ T9201] device macsec0 entered promiscuous mode [ 258.185449][ T9200] bridge0: port 1(bridge_slave_0) entered blocking state [ 258.192295][ T9200] bridge0: port 1(bridge_slave_0) entered disabled state [ 258.199816][ T9200] device bridge_slave_0 entered promiscuous mode [ 258.502811][ T9200] bridge0: port 2(bridge_slave_1) entered blocking state [ 258.509686][ T9200] bridge0: port 2(bridge_slave_1) entered disabled state [ 258.544993][ T9200] device bridge_slave_1 entered promiscuous mode [ 259.527346][ T9] device bridge_slave_1 left promiscuous mode [ 259.528063][ T9244] syz.1.3279[9244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.533314][ T9244] syz.1.3279[9244] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 259.536592][ T9] ÿÿÿÿÿÿ: port 2(bridge_slave_1) entered disabled state [ 259.590565][ T9] device bridge_slave_0 left promiscuous mode [ 259.599359][ T9] ÿÿÿÿÿÿ: port 1(bridge_slave_0) entered disabled state [ 259.609507][ T9] device veth0_vlan left promiscuous mode [ 260.232936][ T2053] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 260.253104][ T2053] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 260.502874][ T2047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 260.520071][ T2047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 260.529115][ T2047] bridge0: port 1(bridge_slave_0) entered blocking state [ 260.535971][ T2047] bridge0: port 1(bridge_slave_0) entered forwarding state [ 260.544227][ T2047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 260.552318][ T2047] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 260.560469][ T2047] bridge0: port 2(bridge_slave_1) entered blocking state [ 260.567314][ T2047] bridge0: port 2(bridge_slave_1) entered forwarding state [ 260.574821][ T2047] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 260.582629][ T2047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 260.590548][ T2047] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 260.598593][ T2047] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 260.610723][ T9200] device veth0_vlan entered promiscuous mode [ 260.723413][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 260.751119][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 260.880161][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 260.891166][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 260.899040][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 260.907190][ T2047] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 260.914790][ T2047] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 261.028481][ T9200] device veth1_macvtap entered promiscuous mode [ 261.099164][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 261.130898][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 261.227145][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 261.489629][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 261.568078][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 261.581147][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 261.589275][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 262.470568][ T9322] device syzkaller0 entered promiscuous mode [ 262.944717][ T9342] device syzkaller0 entered promiscuous mode [ 263.037799][ T9356] FAULT_INJECTION: forcing a failure. [ 263.037799][ T9356] name failslab, interval 1, probability 0, space 0, times 0 [ 263.050226][ T9356] CPU: 0 PID: 9356 Comm: syz.0.3319 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 263.061304][ T9356] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 263.071195][ T9356] Call Trace: [ 263.074331][ T9356] dump_stack_lvl+0x1e2/0x24b [ 263.078838][ T9356] ? panic+0x812/0x812 [ 263.082741][ T9356] ? slab_post_alloc_hook+0x80/0x2f0 [ 263.087866][ T9356] ? bfq_pos_tree_add_move+0x43b/0x43b [ 263.093158][ T9356] ? __kasan_check_write+0x14/0x20 [ 263.098104][ T9356] dump_stack+0x15/0x17 [ 263.102094][ T9356] should_fail+0x3c6/0x510 [ 263.106355][ T9356] ? skb_clone+0x1de/0x370 [ 263.110603][ T9356] __should_failslab+0xa4/0xe0 [ 263.115203][ T9356] should_failslab+0x9/0x20 [ 263.119540][ T9356] kmem_cache_alloc+0x3d/0x2e0 [ 263.124141][ T9356] ? __bpf_redirect+0x673/0xde0 [ 263.128828][ T9356] skb_clone+0x1de/0x370 [ 263.132906][ T9356] bpf_clone_redirect+0xa6/0x390 [ 263.137682][ T9356] bpf_prog_da1e0ee5f8d5c8f5+0x55/0xb7c [ 263.143062][ T9356] ? __kasan_slab_alloc+0xc3/0xe0 [ 263.147921][ T9356] ? __kasan_slab_alloc+0xb1/0xe0 [ 263.152782][ T9356] ? slab_post_alloc_hook+0x61/0x2f0 [ 263.157900][ T9356] ? kmem_cache_alloc+0x168/0x2e0 [ 263.162849][ T9356] ? __build_skb+0x2a/0x300 [ 263.167189][ T9356] ? build_skb+0x25/0x1e0 [ 263.171353][ T9356] ? bpf_prog_test_run_skb+0x388/0x1410 [ 263.176735][ T9356] ? __se_sys_bpf+0x5235/0x11cb0 [ 263.181506][ T9356] ? __x64_sys_bpf+0x7b/0x90 [ 263.185939][ T9356] ? do_syscall_64+0x34/0x70 [ 263.190365][ T9356] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 263.196272][ T9356] ? __kasan_check_read+0x11/0x20 [ 263.201123][ T9356] ? bpf_test_timer_continue+0x140/0x440 [ 263.206595][ T9356] bpf_test_run+0x40b/0xc20 [ 263.210936][ T9356] ? convert___skb_to_skb+0x570/0x570 [ 263.216139][ T9356] ? eth_type_trans+0x2e4/0x620 [ 263.220825][ T9356] ? eth_get_headlen+0x240/0x240 [ 263.225601][ T9356] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 263.230981][ T9356] ? convert___skb_to_skb+0x44/0x570 [ 263.236103][ T9356] ? memcpy+0x56/0x70 [ 263.239918][ T9356] bpf_prog_test_run_skb+0xb6e/0x1410 [ 263.245134][ T9356] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 263.250856][ T9356] ? __kasan_check_write+0x14/0x20 [ 263.255804][ T9356] ? fput_many+0x160/0x1b0 [ 263.260060][ T9356] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 263.265787][ T9356] __se_sys_bpf+0x5235/0x11cb0 [ 263.270384][ T9356] ? stack_trace_save+0x113/0x1c0 [ 263.275244][ T9356] ? terminate_walk+0x407/0x4f0 [ 263.279931][ T9356] ? stack_trace_snprint+0xf0/0xf0 [ 263.284882][ T9356] ? kmem_cache_free+0xa9/0x1e0 [ 263.289565][ T9356] ? kmem_cache_free+0xa9/0x1e0 [ 263.294252][ T9356] ? kasan_set_track+0x5d/0x70 [ 263.298850][ T9356] ? kasan_set_track+0x4b/0x70 [ 263.303450][ T9356] ? kasan_set_free_info+0x23/0x40 [ 263.308396][ T9356] ? ____kasan_slab_free+0x121/0x160 [ 263.313518][ T9356] ? __kasan_slab_free+0x11/0x20 [ 263.318294][ T9356] ? __x64_sys_bpf+0x90/0x90 [ 263.322717][ T9356] ? do_sys_openat2+0x5e1/0x6f0 [ 263.327403][ T9356] ? __x64_sys_openat+0x243/0x290 [ 263.332263][ T9356] ? do_syscall_64+0x34/0x70 [ 263.336698][ T9356] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 263.342593][ T9356] ? _kstrtoull+0x3a0/0x4a0 [ 263.346935][ T9356] ? kstrtouint_from_user+0x20a/0x2a0 [ 263.352140][ T9356] ? kstrtol_from_user+0x310/0x310 [ 263.357087][ T9356] ? memset+0x35/0x40 [ 263.360906][ T9356] ? __fsnotify_parent+0x4b9/0x6c0 [ 263.365864][ T9356] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 263.372448][ T9356] ? proc_fail_nth_write+0x20b/0x290 [ 263.377572][ T9356] ? proc_fail_nth_read+0x210/0x210 [ 263.382605][ T9356] ? security_file_permission+0x86/0xb0 [ 263.387987][ T9356] ? rw_verify_area+0x1c3/0x360 [ 263.392676][ T9356] ? slab_free_freelist_hook+0xc0/0x190 [ 263.398054][ T9356] ? preempt_count_add+0x92/0x1a0 [ 263.402915][ T9356] ? vfs_write+0x854/0xe70 [ 263.407172][ T9356] ? kernel_write+0x3d0/0x3d0 [ 263.411684][ T9356] ? __kasan_check_write+0x14/0x20 [ 263.416626][ T9356] ? mutex_lock+0xa5/0x110 [ 263.420878][ T9356] ? mutex_trylock+0xa0/0xa0 [ 263.425308][ T9356] ? __kasan_check_write+0x14/0x20 [ 263.430339][ T9356] ? fput_many+0x160/0x1b0 [ 263.434599][ T9356] ? debug_smp_processor_id+0x17/0x20 [ 263.439801][ T9356] __x64_sys_bpf+0x7b/0x90 [ 263.444053][ T9356] do_syscall_64+0x34/0x70 [ 263.448307][ T9356] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 263.454033][ T9356] RIP: 0033:0x7fa84b38dbd9 [ 263.458289][ T9356] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 263.477725][ T9356] RSP: 002b:00007fa84a60f048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 263.485970][ T9356] RAX: ffffffffffffffda RBX: 00007fa84b51bf60 RCX: 00007fa84b38dbd9 [ 263.493779][ T9356] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 263.501593][ T9356] RBP: 00007fa84a60f0a0 R08: 0000000000000000 R09: 0000000000000000 [ 263.509406][ T9356] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 263.517215][ T9356] R13: 000000000000000b R14: 00007fa84b51bf60 R15: 00007ffcff034328 [ 264.044174][ T9369] device sit0 left promiscuous mode [ 264.173218][ T9369] device sit0 entered promiscuous mode [ 265.595031][ T9438] device pim6reg1 entered promiscuous mode [ 266.700868][ T9475] ip6_tunnel: non-ECT from db5b:6861:58bb:cfe8:875a:0605:0000:0023 with DS=0x32 [ 270.984031][ T9590] device sit0 left promiscuous mode [ 270.995276][ T9592] device sit0 entered promiscuous mode [ 271.195467][ T9602] device pim6reg1 entered promiscuous mode [ 271.916520][ T9627] FAULT_INJECTION: forcing a failure. [ 271.916520][ T9627] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 272.053079][ T9627] CPU: 1 PID: 9627 Comm: syz.2.3414 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 272.064179][ T9627] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 272.074070][ T9627] Call Trace: [ 272.077201][ T9627] dump_stack_lvl+0x1e2/0x24b [ 272.081713][ T9627] ? bfq_pos_tree_add_move+0x43b/0x43b [ 272.087007][ T9627] dump_stack+0x15/0x17 [ 272.091083][ T9627] should_fail+0x3c6/0x510 [ 272.095338][ T9627] should_fail_usercopy+0x1a/0x20 [ 272.100194][ T9627] _copy_to_user+0x20/0x90 [ 272.104464][ T9627] simple_read_from_buffer+0xc7/0x150 [ 272.109663][ T9627] proc_fail_nth_read+0x1a3/0x210 [ 272.114521][ T9627] ? security_file_permission+0x7b/0xb0 [ 272.119898][ T9627] ? proc_fault_inject_write+0x390/0x390 [ 272.125366][ T9627] ? security_file_permission+0x86/0xb0 [ 272.130745][ T9627] ? rw_verify_area+0x1c3/0x360 [ 272.135433][ T9627] ? proc_fault_inject_write+0x390/0x390 [ 272.140901][ T9627] vfs_read+0x204/0xbb0 [ 272.144895][ T9627] ? kernel_read+0x70/0x70 [ 272.149148][ T9627] ? __kasan_check_write+0x14/0x20 [ 272.154093][ T9627] ? mutex_lock+0xa5/0x110 [ 272.158351][ T9627] ? mutex_trylock+0xa0/0xa0 [ 272.162775][ T9627] ? __fdget_pos+0x2e7/0x3a0 [ 272.167199][ T9627] ? ksys_read+0x77/0x2c0 [ 272.171363][ T9627] ksys_read+0x199/0x2c0 [ 272.175444][ T9627] ? vfs_write+0xe70/0xe70 [ 272.179701][ T9627] ? debug_smp_processor_id+0x17/0x20 [ 272.184906][ T9627] __x64_sys_read+0x7b/0x90 [ 272.189246][ T9627] do_syscall_64+0x34/0x70 [ 272.193501][ T9627] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 272.199225][ T9627] RIP: 0033:0x7f6f359e66bc [ 272.203480][ T9627] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 c9 8c 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 1f 8d 02 00 48 [ 272.222919][ T9627] RSP: 002b:00007f6f34c69040 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 272.231162][ T9627] RAX: ffffffffffffffda RBX: 00007f6f35b75f60 RCX: 00007f6f359e66bc [ 272.238972][ T9627] RDX: 000000000000000f RSI: 00007f6f34c690b0 RDI: 0000000000000008 [ 272.246784][ T9627] RBP: 00007f6f34c690a0 R08: 0000000000000000 R09: 0000000000000000 [ 272.255030][ T9627] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 272.262840][ T9627] R13: 000000000000000b R14: 00007f6f35b75f60 R15: 00007ffed1357d88 [ 275.477174][ T24] audit: type=1400 audit(1720051741.259:165): avc: denied { create } for pid=9696 comm="syz.0.3434" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 275.927671][ T9713] bridge0: port 1(bridge_slave_0) entered blocking state [ 275.934695][ T9713] bridge0: port 1(bridge_slave_0) entered disabled state [ 275.941937][ T9713] device bridge_slave_0 entered promiscuous mode [ 275.949416][ T9713] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.956477][ T9713] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.964305][ T9713] device bridge_slave_1 entered promiscuous mode [ 276.026639][ T9713] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.033510][ T9713] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.040566][ T9713] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.047472][ T9713] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.070788][ T2045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 276.141838][ T2045] bridge0: port 1(bridge_slave_0) entered disabled state [ 276.154583][ T2045] bridge0: port 2(bridge_slave_1) entered disabled state [ 276.294595][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 276.389640][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 276.405529][ T2043] bridge0: port 1(bridge_slave_0) entered blocking state [ 276.412377][ T2043] bridge0: port 1(bridge_slave_0) entered forwarding state [ 276.419653][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 276.427676][ T2043] bridge0: port 2(bridge_slave_1) entered blocking state [ 276.434528][ T2043] bridge0: port 2(bridge_slave_1) entered forwarding state [ 276.441690][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 276.449434][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 276.472976][ T9713] device veth0_vlan entered promiscuous mode [ 276.490302][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 276.504179][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 276.525718][ T9713] device veth1_macvtap entered promiscuous mode [ 276.533708][ T2045] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 276.561744][ T2045] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 276.569689][ T2045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 276.578110][ T2045] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 276.586246][ T2045] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 276.671461][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 276.701617][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 276.821062][ T2045] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 276.860422][ T2045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 277.197662][ T9752] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.204581][ T9752] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.211688][ T9752] device bridge_slave_0 entered promiscuous mode [ 277.218425][ T9752] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.225276][ T9752] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.232469][ T9752] device bridge_slave_1 entered promiscuous mode [ 277.330061][ T2055] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 277.438421][ T2055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 277.485454][ T317] device bridge_slave_1 left promiscuous mode [ 277.491400][ T317] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.554122][ T317] device bridge_slave_0 left promiscuous mode [ 277.560216][ T317] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.569213][ T317] device veth1_macvtap left promiscuous mode [ 277.575103][ T317] device veth0_vlan left promiscuous mode [ 277.867787][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 277.880356][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 277.905944][ T2043] bridge0: port 1(bridge_slave_0) entered blocking state [ 277.912814][ T2043] bridge0: port 1(bridge_slave_0) entered forwarding state [ 277.935131][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 277.960591][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 277.986327][ T2043] bridge0: port 2(bridge_slave_1) entered blocking state [ 277.993203][ T2043] bridge0: port 2(bridge_slave_1) entered forwarding state [ 278.029546][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 278.054707][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 278.099298][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 278.120570][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 278.145695][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 278.168070][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 278.190657][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 278.216331][ T9752] device veth0_vlan entered promiscuous mode [ 278.242522][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 278.286716][ T9752] device veth1_macvtap entered promiscuous mode [ 278.345977][ T2055] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 278.380142][ T2055] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 278.478898][ T2045] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 278.515109][ T2045] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 279.417586][ T9817] device syzkaller0 entered promiscuous mode [ 282.912196][ T24] audit: type=1400 audit(1720051748.689:166): avc: denied { create } for pid=9929 comm="syz.1.3510" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 283.050516][ T24] audit: type=1400 audit(1720051748.829:167): avc: denied { create } for pid=9935 comm="syz.2.3513" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 283.492464][ T9956] device vxcan1 entered promiscuous mode [ 284.255636][ T9982] device pim6reg1 entered promiscuous mode [ 284.585109][ T9999] syz.4.3530[9999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 284.591215][ T9999] syz.4.3530[9999] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 285.115205][T10005] device wg2 left promiscuous mode [ 286.852642][T10075] device pim6reg1 entered promiscuous mode [ 287.807227][T10180] device veth0_vlan left promiscuous mode [ 287.884186][T10180] device veth0_vlan entered promiscuous mode [ 288.160265][T10204] device syzkaller0 entered promiscuous mode [ 288.213699][T10207] device veth1_macvtap left promiscuous mode [ 288.234905][T10207] device macsec0 entered promiscuous mode [ 288.256290][T10210] device veth1_macvtap entered promiscuous mode [ 288.660792][T10232] syz.3.3617[10232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 288.674853][T10232] syz.3.3617[10232] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 289.265734][T10258] device syzkaller0 entered promiscuous mode [ 290.595150][T10308] device syzkaller0 entered promiscuous mode [ 292.521510][ T24] audit: type=1400 audit(1720051758.299:168): avc: denied { create } for pid=10438 comm="syz.0.3698" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 293.483075][T10477] syz.3.3713[10477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.483144][T10477] syz.3.3713[10477] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 293.954784][T10486] bridge0: port 1(bridge_slave_0) entered blocking state [ 293.973038][T10486] bridge0: port 1(bridge_slave_0) entered disabled state [ 293.980290][T10486] device bridge_slave_0 entered promiscuous mode [ 294.025140][T10486] bridge0: port 2(bridge_slave_1) entered blocking state [ 294.052257][T10486] bridge0: port 2(bridge_slave_1) entered disabled state [ 294.141721][T10486] device bridge_slave_1 entered promiscuous mode [ 295.235380][T10536] FAULT_INJECTION: forcing a failure. [ 295.235380][T10536] name failslab, interval 1, probability 0, space 0, times 0 [ 295.253367][T10536] CPU: 1 PID: 10536 Comm: syz.1.3735 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 295.264529][T10536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 295.274420][T10536] Call Trace: [ 295.277557][T10536] dump_stack_lvl+0x1e2/0x24b [ 295.282066][T10536] ? bfq_pos_tree_add_move+0x43b/0x43b [ 295.287365][T10536] dump_stack+0x15/0x17 [ 295.291349][T10536] should_fail+0x3c6/0x510 [ 295.295598][T10536] ? security_prepare_creds+0x4d/0x140 [ 295.300893][T10536] __should_failslab+0xa4/0xe0 [ 295.305496][T10536] should_failslab+0x9/0x20 [ 295.309837][T10536] __kmalloc+0x60/0x330 [ 295.313826][T10536] security_prepare_creds+0x4d/0x140 [ 295.318946][T10536] prepare_creds+0x3f8/0x5f0 [ 295.323371][T10536] copy_creds+0xe7/0x480 [ 295.327451][T10536] copy_process+0x93f/0x3340 [ 295.331879][T10536] ? timerqueue_add+0x24c/0x270 [ 295.336563][T10536] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 295.341510][T10536] ? enqueue_hrtimer+0xad/0x200 [ 295.346199][T10536] kernel_clone+0x21e/0x9e0 [ 295.350538][T10536] ? kvm_sched_clock_read+0x18/0x40 [ 295.355571][T10536] ? create_io_thread+0x1e0/0x1e0 [ 295.360429][T10536] ? sched_clock+0x3a/0x40 [ 295.364686][T10536] __x64_sys_clone+0x23f/0x290 [ 295.369283][T10536] ? __do_sys_vfork+0x130/0x130 [ 295.373977][T10536] ? syscall_enter_from_user_mode+0x1a/0x1a0 [ 295.379785][T10536] do_syscall_64+0x34/0x70 [ 295.384040][T10536] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 295.389766][T10536] RIP: 0033:0x7fa316cc9bd9 [ 295.394021][T10536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 295.413457][T10536] RSP: 002b:00007fa315f4aff8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 295.421704][T10536] RAX: ffffffffffffffda RBX: 00007fa316e57f60 RCX: 00007fa316cc9bd9 [ 295.429513][T10536] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 295.437326][T10536] RBP: 00007fa315f4b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 295.445136][T10536] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 295.452949][T10536] R13: 000000000000000b R14: 00007fa316e57f60 R15: 00007fffea500238 [ 295.557169][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 295.565550][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 295.573522][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 295.580689][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 295.589118][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 295.599440][ T2584] bridge0: port 1(bridge_slave_0) entered blocking state [ 295.606308][ T2584] bridge0: port 1(bridge_slave_0) entered forwarding state [ 295.614863][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 295.643723][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 295.651705][ T2584] bridge0: port 2(bridge_slave_1) entered blocking state [ 295.658554][ T2584] bridge0: port 2(bridge_slave_1) entered forwarding state [ 295.665957][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 295.673808][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 295.681552][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 295.689723][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 295.697732][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 295.710203][T10486] device veth0_vlan entered promiscuous mode [ 295.728285][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 295.746930][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 295.796338][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 295.978251][T10486] device veth1_macvtap entered promiscuous mode [ 295.986811][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 295.995479][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 296.018525][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 296.041387][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 296.056281][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 296.065497][T10574] syz.3.3745[10574] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.065547][T10574] syz.3.3745[10574] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 296.077582][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 296.098393][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 296.601636][T10583] device syzkaller0 entered promiscuous mode [ 297.132079][ T7] device bridge_slave_1 left promiscuous mode [ 297.140138][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 297.147609][ T7] device bridge_slave_0 left promiscuous mode [ 297.156683][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 297.162733][T10608] syz.1.3759[10608] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.163708][T10608] syz.1.3759[10608] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 297.176586][ T7] device veth1_macvtap left promiscuous mode [ 297.196049][ T7] device veth0_vlan left promiscuous mode [ 297.359939][T10609] device syzkaller0 entered promiscuous mode [ 299.268870][T10662] device syzkaller0 entered promiscuous mode [ 299.280743][T10676] device pim6reg1 entered promiscuous mode [ 299.350155][T10693] syz.0.3788[10693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.350202][T10693] syz.0.3788[10693] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.383195][T10696] syz.2.3789[10696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.398574][T10696] syz.2.3789[10696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.443488][T10696] syz.2.3789[10696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 299.454825][T10696] syz.2.3789[10696] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.319850][T10721] device syzkaller0 entered promiscuous mode [ 300.449484][T10737] device syzkaller0 entered promiscuous mode [ 300.872724][T10750] syz.1.3809[10750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 300.872781][T10750] syz.1.3809[10750] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.399171][T10773] syz.2.3818[10773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 301.460058][T10773] syz.2.3818[10773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 306.347317][T10899] FAULT_INJECTION: forcing a failure. [ 306.347317][T10899] name failslab, interval 1, probability 0, space 0, times 0 [ 306.370953][T10899] CPU: 0 PID: 10899 Comm: syz.0.3870 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 306.382105][T10899] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 306.391997][T10899] Call Trace: [ 306.395132][T10899] dump_stack_lvl+0x1e2/0x24b [ 306.399642][T10899] ? bfq_pos_tree_add_move+0x43b/0x43b [ 306.404936][T10899] dump_stack+0x15/0x17 [ 306.408929][T10899] should_fail+0x3c6/0x510 [ 306.413182][T10899] ? skb_ensure_writable+0x2d0/0x440 [ 306.418303][T10899] __should_failslab+0xa4/0xe0 [ 306.422903][T10899] should_failslab+0x9/0x20 [ 306.427240][T10899] __kmalloc_track_caller+0x5f/0x320 [ 306.432362][T10899] ? skb_ensure_writable+0x2d0/0x440 [ 306.437481][T10899] pskb_expand_head+0x12b/0x1180 [ 306.442351][T10899] ? __kasan_check_write+0x14/0x20 [ 306.447299][T10899] skb_ensure_writable+0x2d0/0x440 [ 306.452243][T10899] bpf_clone_redirect+0x117/0x390 [ 306.457107][T10899] bpf_prog_da1e0ee5f8d5c8f5+0x55/0x9fc [ 306.462483][T10899] ? __kasan_slab_alloc+0xc3/0xe0 [ 306.467343][T10899] ? __kasan_slab_alloc+0xb1/0xe0 [ 306.472205][T10899] ? slab_post_alloc_hook+0x61/0x2f0 [ 306.477326][T10899] ? kmem_cache_alloc+0x168/0x2e0 [ 306.482184][T10899] ? __build_skb+0x2a/0x300 [ 306.486523][T10899] ? build_skb+0x25/0x1e0 [ 306.490692][T10899] ? bpf_prog_test_run_skb+0x388/0x1410 [ 306.496072][T10899] ? __se_sys_bpf+0x5235/0x11cb0 [ 306.500845][T10899] ? __x64_sys_bpf+0x7b/0x90 [ 306.505279][T10899] ? do_syscall_64+0x34/0x70 [ 306.509701][T10899] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 306.515611][T10899] ? __kasan_check_read+0x11/0x20 [ 306.520461][T10899] ? bpf_test_timer_continue+0x140/0x440 [ 306.525932][T10899] bpf_test_run+0x40b/0xc20 [ 306.530272][T10899] ? convert___skb_to_skb+0x570/0x570 [ 306.535473][T10899] ? eth_type_trans+0x2e4/0x620 [ 306.540162][T10899] ? eth_get_headlen+0x240/0x240 [ 306.544936][T10899] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 306.550316][T10899] ? convert___skb_to_skb+0x44/0x570 [ 306.555437][T10899] ? memcpy+0x56/0x70 [ 306.559256][T10899] bpf_prog_test_run_skb+0xb6e/0x1410 [ 306.564468][T10899] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 306.570195][T10899] ? __kasan_check_write+0x14/0x20 [ 306.575140][T10899] ? fput_many+0x160/0x1b0 [ 306.579393][T10899] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 306.585121][T10899] __se_sys_bpf+0x5235/0x11cb0 [ 306.589722][T10899] ? stack_trace_save+0x113/0x1c0 [ 306.594581][T10899] ? terminate_walk+0x407/0x4f0 [ 306.599267][T10899] ? stack_trace_snprint+0xf0/0xf0 [ 306.604220][T10899] ? kmem_cache_free+0xa9/0x1e0 [ 306.608902][T10899] ? kmem_cache_free+0xa9/0x1e0 [ 306.613589][T10899] ? kasan_set_track+0x5d/0x70 [ 306.618186][T10899] ? kasan_set_track+0x4b/0x70 [ 306.622788][T10899] ? kasan_set_free_info+0x23/0x40 [ 306.627734][T10899] ? ____kasan_slab_free+0x121/0x160 [ 306.632856][T10899] ? __kasan_slab_free+0x11/0x20 [ 306.637629][T10899] ? __x64_sys_bpf+0x90/0x90 [ 306.642055][T10899] ? do_sys_openat2+0x5e1/0x6f0 [ 306.646740][T10899] ? __x64_sys_openat+0x243/0x290 [ 306.651603][T10899] ? do_syscall_64+0x34/0x70 [ 306.656033][T10899] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 306.661933][T10899] ? _kstrtoull+0x3a0/0x4a0 [ 306.666273][T10899] ? kstrtouint_from_user+0x20a/0x2a0 [ 306.671478][T10899] ? kstrtol_from_user+0x310/0x310 [ 306.676425][T10899] ? memset+0x35/0x40 [ 306.680258][T10899] ? __fsnotify_parent+0x4b9/0x6c0 [ 306.685199][T10899] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 306.691792][T10899] ? proc_fail_nth_write+0x20b/0x290 [ 306.696916][T10899] ? proc_fail_nth_read+0x210/0x210 [ 306.701945][T10899] ? security_file_permission+0x86/0xb0 [ 306.707326][T10899] ? rw_verify_area+0x1c3/0x360 [ 306.712012][T10899] ? slab_free_freelist_hook+0xc0/0x190 [ 306.717390][T10899] ? preempt_count_add+0x92/0x1a0 [ 306.722252][T10899] ? vfs_write+0x854/0xe70 [ 306.726507][T10899] ? kernel_write+0x3d0/0x3d0 [ 306.731020][T10899] ? __kasan_check_write+0x14/0x20 [ 306.735964][T10899] ? mutex_lock+0xa5/0x110 [ 306.740219][T10899] ? mutex_trylock+0xa0/0xa0 [ 306.744656][T10899] ? __kasan_check_write+0x14/0x20 [ 306.749590][T10899] ? fput_many+0x160/0x1b0 [ 306.753850][T10899] ? debug_smp_processor_id+0x17/0x20 [ 306.759057][T10899] __x64_sys_bpf+0x7b/0x90 [ 306.763308][T10899] do_syscall_64+0x34/0x70 [ 306.767561][T10899] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 306.773295][T10899] RIP: 0033:0x7f2d13d8bbd9 [ 306.777545][T10899] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 306.796985][T10899] RSP: 002b:00007f2d1300d048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 306.805227][T10899] RAX: ffffffffffffffda RBX: 00007f2d13f19f60 RCX: 00007f2d13d8bbd9 [ 306.813033][T10899] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 306.820848][T10899] RBP: 00007f2d1300d0a0 R08: 0000000000000000 R09: 0000000000000000 [ 306.828654][T10899] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 306.836555][T10899] R13: 000000000000000b R14: 00007f2d13f19f60 R15: 00007fff1195b948 [ 306.856633][ T24] audit: type=1400 audit(1720051772.639:169): avc: denied { rename } for pid=75 comm="syslogd" name="messages" dev="tmpfs" ino=6 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 306.897964][T10900] device pim6reg1 entered promiscuous mode [ 306.929034][ T24] audit: type=1400 audit(1720051772.639:170): avc: denied { unlink } for pid=75 comm="syslogd" name="messages.0" dev="tmpfs" ino=2 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 306.951523][ T24] audit: type=1400 audit(1720051772.639:171): avc: denied { create } for pid=75 comm="syslogd" name="messages" scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:tmpfs_t tclass=file permissive=1 [ 307.053360][T10916] FAULT_INJECTION: forcing a failure. [ 307.053360][T10916] name failslab, interval 1, probability 0, space 0, times 0 [ 307.069311][T10916] CPU: 1 PID: 10916 Comm: syz.0.3875 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 307.080485][T10916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 307.090371][T10916] Call Trace: [ 307.093506][T10916] dump_stack_lvl+0x1e2/0x24b [ 307.098101][T10916] ? panic+0x812/0x812 [ 307.102005][T10916] ? bfq_pos_tree_add_move+0x43b/0x43b [ 307.107299][T10916] ? __irq_exit_rcu+0x40/0x150 [ 307.111900][T10916] dump_stack+0x15/0x17 [ 307.115894][T10916] should_fail+0x3c6/0x510 [ 307.120150][T10916] ? __delayacct_tsk_init+0x2c/0xa0 [ 307.125180][T10916] __should_failslab+0xa4/0xe0 [ 307.129783][T10916] should_failslab+0x9/0x20 [ 307.134119][T10916] kmem_cache_alloc+0x3d/0x2e0 [ 307.138719][T10916] __delayacct_tsk_init+0x2c/0xa0 [ 307.143577][T10916] copy_process+0x9e8/0x3340 [ 307.148007][T10916] ? timerqueue_add+0x24c/0x270 [ 307.152691][T10916] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 307.157637][T10916] ? enqueue_hrtimer+0xad/0x200 [ 307.162325][T10916] ? __hrtimer_run_queues+0x9ea/0xa50 [ 307.167531][T10916] kernel_clone+0x21e/0x9e0 [ 307.171870][T10916] ? ktime_get+0x10e/0x140 [ 307.176126][T10916] ? create_io_thread+0x1e0/0x1e0 [ 307.180985][T10916] __x64_sys_clone+0x23f/0x290 [ 307.185585][T10916] ? __do_sys_vfork+0x130/0x130 [ 307.190270][T10916] ? sched_clock+0x3a/0x40 [ 307.194533][T10916] ? debug_smp_processor_id+0x17/0x20 [ 307.199731][T10916] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 307.205635][T10916] ? asm_sysvec_apic_timer_interrupt+0xa/0x20 [ 307.211534][T10916] ? irqentry_exit_to_user_mode+0x41/0x80 [ 307.217089][T10916] do_syscall_64+0x34/0x70 [ 307.221349][T10916] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 307.227069][T10916] RIP: 0033:0x7f2d13d8bbd9 [ 307.231324][T10916] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 307.250763][T10916] RSP: 002b:00007f2d1300cff8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 307.259007][T10916] RAX: ffffffffffffffda RBX: 00007f2d13f19f60 RCX: 00007f2d13d8bbd9 [ 307.266822][T10916] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 307.274630][T10916] RBP: 00007f2d1300d0a0 R08: 0000000000000000 R09: 0000000000000000 [ 307.282441][T10916] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 307.290251][T10916] R13: 000000000000000b R14: 00007f2d13f19f60 R15: 00007fff1195b948 [ 307.386562][T10945] bridge0: port 3(veth0_to_batadv) entered blocking state [ 307.491106][T10945] bridge0: port 3(veth0_to_batadv) entered disabled state [ 307.579734][T10945] device veth0_to_batadv entered promiscuous mode [ 307.599091][T10945] bridge0: port 3(veth0_to_batadv) entered blocking state [ 307.606074][T10945] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 307.705786][T10951] device veth0_to_batadv left promiscuous mode [ 307.711936][T10951] bridge0: port 3(veth0_to_batadv) entered disabled state [ 307.734263][T10960] device sit0 left promiscuous mode [ 307.860786][T10966] device pim6reg1 entered promiscuous mode [ 310.209367][T11115] device pim6reg1 entered promiscuous mode [ 310.215603][T11115] FAULT_INJECTION: forcing a failure. [ 310.215603][T11115] name failslab, interval 1, probability 0, space 0, times 0 [ 310.247931][T11115] CPU: 1 PID: 11115 Comm: syz.0.3949 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 310.259097][T11115] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 310.268990][T11115] Call Trace: [ 310.272124][T11115] dump_stack_lvl+0x1e2/0x24b [ 310.276641][T11115] ? bfq_pos_tree_add_move+0x43b/0x43b [ 310.281929][T11115] dump_stack+0x15/0x17 [ 310.285921][T11115] should_fail+0x3c6/0x510 [ 310.290174][T11115] ? inet6_ifinfo_notify+0x70/0x110 [ 310.295208][T11115] __should_failslab+0xa4/0xe0 [ 310.299810][T11115] should_failslab+0x9/0x20 [ 310.304146][T11115] __kmalloc_track_caller+0x5f/0x320 [ 310.309269][T11115] ? kmem_cache_alloc+0x168/0x2e0 [ 310.314125][T11115] ? __alloc_skb+0x80/0x510 [ 310.318465][T11115] ? inet6_ifinfo_notify+0x70/0x110 [ 310.323500][T11115] __alloc_skb+0xbc/0x510 [ 310.327669][T11115] inet6_ifinfo_notify+0x70/0x110 [ 310.332527][T11115] addrconf_notify+0xa48/0xe90 [ 310.337130][T11115] raw_notifier_call_chain+0x8c/0xf0 [ 310.342249][T11115] __dev_notify_flags+0x304/0x610 [ 310.347111][T11115] ? __dev_change_flags+0x6e0/0x6e0 [ 310.352141][T11115] ? __dev_change_flags+0x56c/0x6e0 [ 310.357179][T11115] ? dev_get_flags+0x1e0/0x1e0 [ 310.361775][T11115] ? selinux_capable+0x2f1/0x430 [ 310.366547][T11115] ? selinux_capset+0xf0/0xf0 [ 310.371061][T11115] dev_change_flags+0xf0/0x1a0 [ 310.375660][T11115] dev_ifsioc+0x115/0xae0 [ 310.379825][T11115] ? dev_ioctl+0xb40/0xb40 [ 310.384079][T11115] ? dev_get_by_name_rcu+0xc5/0xf0 [ 310.389030][T11115] dev_ioctl+0x526/0xb40 [ 310.393108][T11115] sock_do_ioctl+0x295/0x3a0 [ 310.397534][T11115] ? sock_show_fdinfo+0xa0/0xa0 [ 310.402218][T11115] ? kernel_write+0x3d0/0x3d0 [ 310.406734][T11115] ? selinux_file_ioctl+0x3cc/0x540 [ 310.411766][T11115] sock_ioctl+0x4a6/0x760 [ 310.415933][T11115] ? sock_poll+0x340/0x340 [ 310.420189][T11115] ? security_file_ioctl+0x84/0xb0 [ 310.425133][T11115] ? sock_poll+0x340/0x340 [ 310.429386][T11115] __se_sys_ioctl+0x114/0x190 [ 310.433900][T11115] __x64_sys_ioctl+0x7b/0x90 [ 310.438324][T11115] do_syscall_64+0x34/0x70 [ 310.442579][T11115] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 310.448302][T11115] RIP: 0033:0x7f2d13d8bbd9 [ 310.452557][T11115] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 310.471992][T11115] RSP: 002b:00007f2d1300d048 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 310.480238][T11115] RAX: ffffffffffffffda RBX: 00007f2d13f19f60 RCX: 00007f2d13d8bbd9 [ 310.488048][T11115] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000008 [ 310.495861][T11115] RBP: 00007f2d1300d0a0 R08: 0000000000000000 R09: 0000000000000000 [ 310.503673][T11115] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 310.511483][T11115] R13: 000000000000000b R14: 00007f2d13f19f60 R15: 00007fff1195b948 [ 311.179079][T11139] device veth1_macvtap left promiscuous mode [ 311.223146][T11139] device macsec0 entered promiscuous mode [ 312.667852][T11185] device veth1_macvtap left promiscuous mode [ 312.694960][T11185] device macsec0 entered promiscuous mode [ 312.835723][T11205] bpf_get_probe_write_proto: 4 callbacks suppressed [ 312.835733][T11205] syz.0.3980[11205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 312.842188][T11205] syz.0.3980[11205] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 314.491935][T11239] device pim6reg1 entered promiscuous mode [ 317.620070][T11418] device sit0 entered promiscuous mode [ 318.648260][T11464] device sit0 left promiscuous mode [ 318.826702][T11471] device sit0 entered promiscuous mode [ 319.594734][T11513] FAULT_INJECTION: forcing a failure. [ 319.594734][T11513] name failslab, interval 1, probability 0, space 0, times 0 [ 319.689344][T11519] device sit0 left promiscuous mode [ 319.712932][T11513] CPU: 1 PID: 11513 Comm: syz.1.4090 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 319.724106][T11513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 319.733996][T11513] Call Trace: [ 319.737137][T11513] dump_stack_lvl+0x1e2/0x24b [ 319.741643][T11513] ? panic+0x812/0x812 [ 319.745546][T11513] ? bfq_pos_tree_add_move+0x43b/0x43b [ 319.750835][T11513] ? kstrtouint_from_user+0x20a/0x2a0 [ 319.756043][T11513] ? kstrtol_from_user+0x310/0x310 [ 319.761006][T11513] dump_stack+0x15/0x17 [ 319.764981][T11513] should_fail+0x3c6/0x510 [ 319.769243][T11513] ? kernfs_fop_write_iter+0x151/0x410 [ 319.774531][T11513] __should_failslab+0xa4/0xe0 [ 319.779131][T11513] should_failslab+0x9/0x20 [ 319.783991][T11513] __kmalloc+0x60/0x330 [ 319.787983][T11513] ? security_file_permission+0x7b/0xb0 [ 319.793367][T11513] kernfs_fop_write_iter+0x151/0x410 [ 319.798512][T11513] vfs_write+0xb55/0xe70 [ 319.802658][T11513] ? kernel_write+0x3d0/0x3d0 [ 319.807169][T11513] ? mutex_trylock+0xa0/0xa0 [ 319.811593][T11513] ? __fdget_pos+0x2e7/0x3a0 [ 319.816013][T11513] ? ksys_write+0x77/0x2c0 [ 319.820268][T11513] ksys_write+0x199/0x2c0 [ 319.824434][T11513] ? __ia32_sys_read+0x90/0x90 [ 319.829034][T11513] ? debug_smp_processor_id+0x17/0x20 [ 319.834237][T11513] __x64_sys_write+0x7b/0x90 [ 319.838667][T11513] do_syscall_64+0x34/0x70 [ 319.842920][T11513] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 319.848645][T11513] RIP: 0033:0x7fa316cc9bd9 [ 319.852901][T11513] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 319.872346][T11513] RSP: 002b:00007fa315f4b048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 319.880588][T11513] RAX: ffffffffffffffda RBX: 00007fa316e57f60 RCX: 00007fa316cc9bd9 [ 319.888393][T11513] RDX: 0000000000000012 RSI: 0000000020000200 RDI: 0000000000000009 [ 319.896206][T11513] RBP: 00007fa315f4b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 319.904017][T11513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 319.911831][T11513] R13: 000000000000000b R14: 00007fa316e57f60 R15: 00007fffea500238 [ 320.008162][T11519] device sit0 entered promiscuous mode [ 320.739602][T11529] bridge0: port 1(bridge_slave_0) entered blocking state [ 320.800522][T11529] bridge0: port 1(bridge_slave_0) entered disabled state [ 320.868097][T11529] device bridge_slave_0 entered promiscuous mode [ 320.944974][T11529] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.015387][T11529] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.086912][T11529] device bridge_slave_1 entered promiscuous mode [ 321.544024][T11529] bridge0: port 2(bridge_slave_1) entered blocking state [ 321.550866][T11529] bridge0: port 2(bridge_slave_1) entered forwarding state [ 321.557971][T11529] bridge0: port 1(bridge_slave_0) entered blocking state [ 321.564764][T11529] bridge0: port 1(bridge_slave_0) entered forwarding state [ 321.651934][ T2048] bridge0: port 1(bridge_slave_0) entered disabled state [ 321.675128][ T2048] bridge0: port 2(bridge_slave_1) entered disabled state [ 321.895917][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 321.903398][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 321.979283][ T2582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 321.987644][ T2582] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 322.033092][ T2582] bridge0: port 1(bridge_slave_0) entered blocking state [ 322.039945][ T2582] bridge0: port 1(bridge_slave_0) entered forwarding state [ 322.150732][ T2582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 322.223210][ T2582] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 322.315603][ T2582] bridge0: port 2(bridge_slave_1) entered blocking state [ 322.322446][ T2582] bridge0: port 2(bridge_slave_1) entered forwarding state [ 322.331631][ T2582] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 322.341420][ T2582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 322.420169][ T2582] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 322.498910][ T2582] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 322.578657][T11529] device veth0_vlan entered promiscuous mode [ 322.640206][ T2030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 322.673655][ T2030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 322.681871][ T2030] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 322.690090][ T2030] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 322.699907][T11608] syz.3.4126[11608] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.699957][T11608] syz.3.4126[11608] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.793078][T11529] device veth1_macvtap entered promiscuous mode [ 322.813426][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 322.820790][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 322.828724][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 322.838448][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 322.846971][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 322.859824][T11608] syz.3.4126[11608] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.859874][T11608] syz.3.4126[11608] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 322.982687][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 323.007481][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 323.050526][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 323.058983][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 324.027720][ T110] device vlan1 left promiscuous mode [ 324.033013][ T110] bridge0: port 3(vlan1) entered disabled state [ 324.053010][ T110] device bridge_slave_1 left promiscuous mode [ 324.062144][ T110] bridge0: port 2(bridge_slave_1) entered disabled state [ 324.073253][ T110] device bridge_slave_0 left promiscuous mode [ 324.079173][ T110] bridge0: port 1(bridge_slave_0) entered disabled state [ 324.106324][ T110] device veth0_vlan left promiscuous mode [ 324.288400][T11680] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 324.300485][T11682] device sit0 left promiscuous mode [ 324.322369][T11695] Â: renamed from pim6reg1 [ 326.543720][ T110] device bridge_slave_1 left promiscuous mode [ 326.573262][ T110] bridge0: port 2(bridge_slave_1) entered disabled state [ 326.614560][ T110] device bridge_slave_0 left promiscuous mode [ 326.626857][ T110] bridge0: port 1(bridge_slave_0) entered disabled state [ 327.637318][T11805] device syzkaller0 entered promiscuous mode [ 327.780191][T11852] device syzkaller0 entered promiscuous mode [ 327.830379][T11854] FAULT_INJECTION: forcing a failure. [ 327.830379][T11854] name failslab, interval 1, probability 0, space 0, times 0 [ 327.858257][T11854] CPU: 0 PID: 11854 Comm: syz.0.4217 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 327.869435][T11854] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 327.879321][T11854] Call Trace: [ 327.882460][T11854] dump_stack_lvl+0x1e2/0x24b [ 327.886968][T11854] ? panic+0x812/0x812 [ 327.890875][T11854] ? bfq_pos_tree_add_move+0x43b/0x43b [ 327.896167][T11854] ? kstrtouint_from_user+0x20a/0x2a0 [ 327.901375][T11854] ? kstrtol_from_user+0x310/0x310 [ 327.906323][T11854] dump_stack+0x15/0x17 [ 327.910312][T11854] should_fail+0x3c6/0x510 [ 327.914569][T11854] ? kernfs_fop_write_iter+0x151/0x410 [ 327.919864][T11854] __should_failslab+0xa4/0xe0 [ 327.924465][T11854] should_failslab+0x9/0x20 [ 327.928801][T11854] __kmalloc+0x60/0x330 [ 327.932793][T11854] ? security_file_permission+0x7b/0xb0 [ 327.938175][T11854] kernfs_fop_write_iter+0x151/0x410 [ 327.943298][T11854] vfs_write+0xb55/0xe70 [ 327.947375][T11854] ? kernel_write+0x3d0/0x3d0 [ 327.951887][T11854] ? mutex_trylock+0xa0/0xa0 [ 327.956316][T11854] ? __fdget_pos+0x2e7/0x3a0 [ 327.960738][T11854] ? ksys_write+0x77/0x2c0 [ 327.964993][T11854] ksys_write+0x199/0x2c0 [ 327.969160][T11854] ? __ia32_sys_read+0x90/0x90 [ 327.973763][T11854] ? debug_smp_processor_id+0x17/0x20 [ 327.978964][T11854] __x64_sys_write+0x7b/0x90 [ 327.983390][T11854] do_syscall_64+0x34/0x70 [ 327.987647][T11854] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 327.993374][T11854] RIP: 0033:0x7f2d13d8bbd9 [ 327.997624][T11854] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 328.017067][T11854] RSP: 002b:00007f2d1300d048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 328.025309][T11854] RAX: ffffffffffffffda RBX: 00007f2d13f19f60 RCX: 00007f2d13d8bbd9 [ 328.033119][T11854] RDX: 0000000000000012 RSI: 0000000020000200 RDI: 0000000000000007 [ 328.040930][T11854] RBP: 00007f2d1300d0a0 R08: 0000000000000000 R09: 0000000000000000 [ 328.048750][T11854] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 328.056555][T11854] R13: 000000000000000b R14: 00007f2d13f19f60 R15: 00007fff1195b948 [ 328.107138][T11869] syz.1.4223[11869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.107186][T11869] syz.1.4223[11869] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.911255][T11883] device syzkaller0 entered promiscuous mode [ 328.996840][T11901] device syzkaller0 entered promiscuous mode [ 329.499228][T11947] syz.4.4253[11947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.499272][T11947] syz.4.4253[11947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 329.875119][T11958] device syzkaller0 entered promiscuous mode [ 329.905832][T11965] device pim6reg1 entered promiscuous mode [ 333.978809][T12141] tap0: tun_chr_ioctl cmd 1074025673 [ 334.038091][T12143] gretap0: refused to change device tx_queue_len [ 337.047745][ T24] audit: type=1400 audit(1720051802.829:172): avc: denied { append } for pid=12247 comm="syz.4.4363" name="ppp" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 337.534116][T12270] device pim6reg1 entered promiscuous mode [ 339.839295][T12425] device syzkaller0 entered promiscuous mode [ 340.216905][T12461] device syzkaller0 entered promiscuous mode [ 340.640171][T12526] syz.2.4468[12526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 340.640212][T12526] syz.2.4468[12526] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 341.320198][T12534] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.338740][T12534] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.346516][T12534] device bridge_slave_0 entered promiscuous mode [ 341.353675][T12534] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.360527][T12534] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.367899][T12534] device bridge_slave_1 entered promiscuous mode [ 341.412797][T12534] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.419657][T12534] bridge0: port 2(bridge_slave_1) entered forwarding state [ 341.426749][T12534] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.433538][T12534] bridge0: port 1(bridge_slave_0) entered forwarding state [ 341.441872][ T2042] bridge0: port 1(bridge_slave_0) entered disabled state [ 341.452068][ T2042] bridge0: port 2(bridge_slave_1) entered disabled state [ 341.476044][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 341.483531][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 341.505574][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 341.514123][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 341.522082][ T2042] bridge0: port 1(bridge_slave_0) entered blocking state [ 341.528948][ T2042] bridge0: port 1(bridge_slave_0) entered forwarding state [ 341.542940][ T8269] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 341.552404][ T8269] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 341.562738][ T8269] bridge0: port 2(bridge_slave_1) entered blocking state [ 341.569597][ T8269] bridge0: port 2(bridge_slave_1) entered forwarding state [ 341.599976][T12571] device syzkaller0 entered promiscuous mode [ 341.613347][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 341.621232][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 341.630104][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 341.641536][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 341.661455][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 341.669750][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 341.678943][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 341.686910][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 341.694764][T12534] device veth0_vlan entered promiscuous mode [ 341.700862][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 341.708657][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 341.726115][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 341.734274][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 341.743785][T12534] device veth1_macvtap entered promiscuous mode [ 341.754052][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 341.761876][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 341.770412][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 341.778809][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 341.788985][ T365] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 343.566705][T12657] device syzkaller0 entered promiscuous mode [ 343.581806][T12661] device syzkaller0 entered promiscuous mode [ 343.966281][T12677] FAULT_INJECTION: forcing a failure. [ 343.966281][T12677] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 343.979232][T12677] CPU: 0 PID: 12677 Comm: syz.0.4527 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 343.990302][T12677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 344.000196][T12677] Call Trace: [ 344.003327][T12677] dump_stack_lvl+0x1e2/0x24b [ 344.007838][T12677] ? bfq_pos_tree_add_move+0x43b/0x43b [ 344.013132][T12677] ? do_syscall_64+0x34/0x70 [ 344.017560][T12677] dump_stack+0x15/0x17 [ 344.021550][T12677] should_fail+0x3c6/0x510 [ 344.025806][T12677] should_fail_usercopy+0x1a/0x20 [ 344.030665][T12677] _copy_from_iter+0x22c/0xd10 [ 344.035266][T12677] ? copyout_mc+0x90/0x90 [ 344.039429][T12677] ? __check_object_size+0x2e6/0x3c0 [ 344.044552][T12677] kernfs_fop_write_iter+0x1a0/0x410 [ 344.049668][T12677] vfs_write+0xb55/0xe70 [ 344.053747][T12677] ? kernel_write+0x3d0/0x3d0 [ 344.058261][T12677] ? mutex_trylock+0xa0/0xa0 [ 344.062685][T12677] ? __fdget_pos+0x2e7/0x3a0 [ 344.067110][T12677] ? ksys_write+0x77/0x2c0 [ 344.071362][T12677] ksys_write+0x199/0x2c0 [ 344.075532][T12677] ? __ia32_sys_read+0x90/0x90 [ 344.080133][T12677] ? debug_smp_processor_id+0x17/0x20 [ 344.085337][T12677] __x64_sys_write+0x7b/0x90 [ 344.089763][T12677] do_syscall_64+0x34/0x70 [ 344.094020][T12677] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 344.099742][T12677] RIP: 0033:0x7fcac0d83bd9 [ 344.103998][T12677] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 344.123434][T12677] RSP: 002b:00007fcac0005048 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 344.131680][T12677] RAX: ffffffffffffffda RBX: 00007fcac0f11f60 RCX: 00007fcac0d83bd9 [ 344.139491][T12677] RDX: 0000000000000012 RSI: 0000000020000200 RDI: 0000000000000007 [ 344.147304][T12677] RBP: 00007fcac00050a0 R08: 0000000000000000 R09: 0000000000000000 [ 344.155113][T12677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 344.162924][T12677] R13: 000000000000000b R14: 00007fcac0f11f60 R15: 00007fffce628798 [ 346.670791][T12797] syz.2.4575[12797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.676246][T12797] syz.2.4575[12797] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.510665][ T24] audit: type=1400 audit(1720051813.289:173): avc: denied { create } for pid=12835 comm="syz.2.4592" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 347.565857][T12839] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.572847][T12839] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.604197][T12839] device bridge_slave_1 left promiscuous mode [ 347.617770][T12839] bridge0: port 2(bridge_slave_1) entered disabled state [ 347.632422][T12839] device bridge_slave_0 left promiscuous mode [ 347.651187][T12839] bridge0: port 1(bridge_slave_0) entered disabled state [ 347.798850][T12853] device pim6reg1 entered promiscuous mode [ 348.104485][T12900] device syzkaller0 entered promiscuous mode [ 349.079147][T12935] device syzkaller0 entered promiscuous mode [ 349.212524][T12955] syz.2.4639[12955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.218835][T12955] syz.2.4639[12955] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 349.373491][ T7] device bridge_slave_1 left promiscuous mode [ 349.393912][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 349.407979][ T7] device bridge_slave_0 left promiscuous mode [ 349.418264][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 349.432491][ T7] device veth0_vlan left promiscuous mode [ 351.357599][ T24] audit: type=1400 audit(1720051817.139:174): avc: denied { setattr } for pid=13030 comm="syz.1.4667" path="/dev/net/tun" dev="devtmpfs" ino=130 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tun_tap_device_t tclass=chr_file permissive=1 [ 351.536304][T13033] bridge0: port 1(bridge_slave_0) entered blocking state [ 351.545508][T13033] bridge0: port 1(bridge_slave_0) entered disabled state [ 351.626820][T13033] device bridge_slave_0 entered promiscuous mode [ 351.634148][T13033] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.641019][T13033] bridge0: port 2(bridge_slave_1) entered disabled state [ 351.648203][T13033] device bridge_slave_1 entered promiscuous mode [ 351.979839][T13033] bridge0: port 2(bridge_slave_1) entered blocking state [ 351.986709][T13033] bridge0: port 2(bridge_slave_1) entered forwarding state [ 351.993818][T13033] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.000576][T13033] bridge0: port 1(bridge_slave_0) entered forwarding state [ 352.077362][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 352.084974][ T2043] bridge0: port 1(bridge_slave_0) entered disabled state [ 352.092110][ T2043] bridge0: port 2(bridge_slave_1) entered disabled state [ 352.115196][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 352.126127][ T2042] bridge0: port 1(bridge_slave_0) entered blocking state [ 352.132976][ T2042] bridge0: port 1(bridge_slave_0) entered forwarding state [ 352.141011][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 352.149085][ T2042] bridge0: port 2(bridge_slave_1) entered blocking state [ 352.155947][ T2042] bridge0: port 2(bridge_slave_1) entered forwarding state [ 352.165532][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 352.215271][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 352.224393][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 352.234853][T13033] device veth0_vlan entered promiscuous mode [ 352.256075][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 352.267907][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 352.282177][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 352.312471][T13033] device veth1_macvtap entered promiscuous mode [ 352.324809][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 352.365534][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 352.381789][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 352.400872][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 352.409029][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 353.225904][T13123] FAULT_INJECTION: forcing a failure. [ 353.225904][T13123] name failslab, interval 1, probability 0, space 0, times 0 [ 353.238343][T13123] CPU: 0 PID: 13123 Comm: syz.1.4700 Tainted: G W 5.10.218-syzkaller-00638-g3feee789f446 #0 [ 353.249487][T13123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/07/2024 [ 353.259388][T13123] Call Trace: [ 353.262516][T13123] dump_stack_lvl+0x1e2/0x24b [ 353.267027][T13123] ? bfq_pos_tree_add_move+0x43b/0x43b [ 353.272321][T13123] dump_stack+0x15/0x17 [ 353.276312][T13123] should_fail+0x3c6/0x510 [ 353.280563][T13123] ? skb_ensure_writable+0x2d0/0x440 [ 353.285686][T13123] __should_failslab+0xa4/0xe0 [ 353.290284][T13123] should_failslab+0x9/0x20 [ 353.294625][T13123] __kmalloc_track_caller+0x5f/0x320 [ 353.299751][T13123] ? skb_ensure_writable+0x2d0/0x440 [ 353.304863][T13123] pskb_expand_head+0x12b/0x1180 [ 353.309641][T13123] ? __kasan_check_write+0x14/0x20 [ 353.314587][T13123] skb_ensure_writable+0x2d0/0x440 [ 353.319532][T13123] bpf_clone_redirect+0x117/0x390 [ 353.324393][T13123] bpf_prog_da1e0ee5f8d5c8f5+0x55/0x20c [ 353.329771][T13123] ? __kasan_slab_alloc+0xc3/0xe0 [ 353.334632][T13123] ? __kasan_slab_alloc+0xb1/0xe0 [ 353.339494][T13123] ? slab_post_alloc_hook+0x61/0x2f0 [ 353.344617][T13123] ? kmem_cache_alloc+0x168/0x2e0 [ 353.349475][T13123] ? __build_skb+0x2a/0x300 [ 353.353898][T13123] ? build_skb+0x25/0x1e0 [ 353.358066][T13123] ? bpf_prog_test_run_skb+0x388/0x1410 [ 353.363449][T13123] ? __se_sys_bpf+0x5235/0x11cb0 [ 353.368222][T13123] ? __x64_sys_bpf+0x7b/0x90 [ 353.372646][T13123] ? do_syscall_64+0x34/0x70 [ 353.377074][T13123] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 353.382986][T13123] ? __kasan_check_read+0x11/0x20 [ 353.387835][T13123] ? bpf_test_timer_continue+0x140/0x440 [ 353.393305][T13123] bpf_test_run+0x40b/0xc20 [ 353.397650][T13123] ? convert___skb_to_skb+0x570/0x570 [ 353.402853][T13123] ? eth_type_trans+0x2e4/0x620 [ 353.407537][T13123] ? eth_get_headlen+0x240/0x240 [ 353.412310][T13123] ? bpf_prog_test_run_skb+0x7c5/0x1410 [ 353.417692][T13123] ? convert___skb_to_skb+0x44/0x570 [ 353.422811][T13123] ? memcpy+0x56/0x70 [ 353.426631][T13123] bpf_prog_test_run_skb+0xb6e/0x1410 [ 353.431845][T13123] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 353.437570][T13123] ? __kasan_check_write+0x14/0x20 [ 353.442517][T13123] ? fput_many+0x160/0x1b0 [ 353.446772][T13123] ? __bpf_prog_test_run_raw_tp+0x240/0x240 [ 353.452496][T13123] __se_sys_bpf+0x5235/0x11cb0 [ 353.457096][T13123] ? stack_trace_save+0x113/0x1c0 [ 353.461958][T13123] ? terminate_walk+0x407/0x4f0 [ 353.466644][T13123] ? stack_trace_snprint+0xf0/0xf0 [ 353.471598][T13123] ? kmem_cache_free+0xa9/0x1e0 [ 353.476281][T13123] ? kmem_cache_free+0xa9/0x1e0 [ 353.480966][T13123] ? kasan_set_track+0x5d/0x70 [ 353.485560][T13123] ? kasan_set_track+0x4b/0x70 [ 353.490163][T13123] ? kasan_set_free_info+0x23/0x40 [ 353.495108][T13123] ? ____kasan_slab_free+0x121/0x160 [ 353.500225][T13123] ? __kasan_slab_free+0x11/0x20 [ 353.505001][T13123] ? __x64_sys_bpf+0x90/0x90 [ 353.509425][T13123] ? do_sys_openat2+0x5e1/0x6f0 [ 353.514113][T13123] ? __x64_sys_openat+0x243/0x290 [ 353.518970][T13123] ? do_syscall_64+0x34/0x70 [ 353.523400][T13123] ? entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 353.529299][T13123] ? _kstrtoull+0x3a0/0x4a0 [ 353.533642][T13123] ? kstrtouint_from_user+0x20a/0x2a0 [ 353.538849][T13123] ? kstrtol_from_user+0x310/0x310 [ 353.543797][T13123] ? memset+0x35/0x40 [ 353.547613][T13123] ? __fsnotify_parent+0x4b9/0x6c0 [ 353.552561][T13123] ? __fsnotify_update_child_dentry_flags+0x2b0/0x2b0 [ 353.559156][T13123] ? proc_fail_nth_write+0x20b/0x290 [ 353.564276][T13123] ? proc_fail_nth_read+0x210/0x210 [ 353.569312][T13123] ? security_file_permission+0x86/0xb0 [ 353.574691][T13123] ? rw_verify_area+0x1c3/0x360 [ 353.579381][T13123] ? slab_free_freelist_hook+0xc0/0x190 [ 353.584762][T13123] ? preempt_count_add+0x92/0x1a0 [ 353.589618][T13123] ? vfs_write+0x854/0xe70 [ 353.593873][T13123] ? kernel_write+0x3d0/0x3d0 [ 353.598388][T13123] ? __kasan_check_write+0x14/0x20 [ 353.603334][T13123] ? mutex_lock+0xa5/0x110 [ 353.607583][T13123] ? mutex_trylock+0xa0/0xa0 [ 353.612012][T13123] ? __kasan_check_write+0x14/0x20 [ 353.616957][T13123] ? fput_many+0x160/0x1b0 [ 353.621218][T13123] ? debug_smp_processor_id+0x17/0x20 [ 353.626419][T13123] __x64_sys_bpf+0x7b/0x90 [ 353.630670][T13123] do_syscall_64+0x34/0x70 [ 353.634928][T13123] entry_SYSCALL_64_after_hwframe+0x61/0xcb [ 353.640652][T13123] RIP: 0033:0x7fa316cc9bd9 [ 353.644906][T13123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 353.664431][T13123] RSP: 002b:00007fa315f4b048 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 353.672677][T13123] RAX: ffffffffffffffda RBX: 00007fa316e57f60 RCX: 00007fa316cc9bd9 [ 353.680486][T13123] RDX: 0000000000000028 RSI: 00000000200000c0 RDI: 000000000000000a [ 353.688300][T13123] RBP: 00007fa315f4b0a0 R08: 0000000000000000 R09: 0000000000000000 [ 353.696113][T13123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 353.703923][T13123] R13: 000000000000000b R14: 00007fa316e57f60 R15: 00007fffea500238 [ 358.594326][T13215] device syzkaller0 entered promiscuous mode [ 360.361437][T13229] device veth1_macvtap left promiscuous mode [ 360.370035][T13229] device macsec0 entered promiscuous mode [ 360.805735][T13239] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.812578][T13239] bridge0: port 1(bridge_slave_0) entered disabled state [ 361.014486][T13239] device bridge_slave_0 entered promiscuous mode [ 361.086683][T13239] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.125893][T13239] bridge0: port 2(bridge_slave_1) entered disabled state [ 361.133162][T13239] device bridge_slave_1 entered promiscuous mode [ 361.706073][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 361.714216][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 361.981928][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 361.990457][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 361.998454][ T2049] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.005295][ T2049] bridge0: port 1(bridge_slave_0) entered forwarding state [ 362.012542][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 362.020790][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 362.028716][ T2049] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.035539][ T2049] bridge0: port 2(bridge_slave_1) entered forwarding state [ 362.044505][ T2042] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 362.194172][T13333] device syzkaller0 entered promiscuous mode [ 362.202444][ T8269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 362.212734][ T8269] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 362.252385][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 362.308719][T13239] device veth0_vlan entered promiscuous mode [ 362.319027][ T2043] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 362.335797][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 362.343053][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 362.356997][T13239] device veth1_macvtap entered promiscuous mode [ 362.365853][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 362.388469][T13328] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.395369][T13328] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.402368][T13328] device bridge_slave_0 entered promiscuous mode [ 362.432648][T13328] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.440037][T13328] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.447306][T13328] device bridge_slave_1 entered promiscuous mode [ 362.455589][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 362.463991][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 362.472108][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 362.484972][ T2584] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 362.639618][T13328] bridge0: port 2(bridge_slave_1) entered blocking state [ 362.646493][T13328] bridge0: port 2(bridge_slave_1) entered forwarding state [ 362.653582][T13328] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.660347][T13328] bridge0: port 1(bridge_slave_0) entered forwarding state [ 362.683165][ T8274] bridge0: port 1(bridge_slave_0) entered disabled state [ 362.692361][ T8274] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.758119][T13379] device pim6reg1 entered promiscuous mode [ 362.916810][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 362.926301][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 362.946387][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 362.956508][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 362.968667][ T2048] bridge0: port 1(bridge_slave_0) entered blocking state [ 362.975516][ T2048] bridge0: port 1(bridge_slave_0) entered forwarding state [ 363.079255][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 363.151700][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 363.214621][ T2048] bridge0: port 2(bridge_slave_1) entered blocking state [ 363.221468][ T2048] bridge0: port 2(bridge_slave_1) entered forwarding state [ 363.272971][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 363.280828][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 363.288855][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 363.296884][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 363.385007][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 363.393175][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 363.401275][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 363.409193][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 363.419113][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 363.493227][ T2049] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 363.500505][T13328] device veth0_vlan entered promiscuous mode [ 363.568608][T13328] device veth1_macvtap entered promiscuous mode [ 363.642648][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 363.723179][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 363.731118][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 363.738862][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 363.747225][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 363.756094][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 363.771963][ T2048] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 365.784289][T13491] device syzkaller0 entered promiscuous mode [ 366.067760][T13515] device pim6reg1 entered promiscuous mode [ 369.755948][T13622] device pim6reg1 entered promiscuous mode [ 371.933137][T13728] device syzkaller0 entered promiscuous mode [ 372.790331][T13756] syz.3.4920[13756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 372.790362][T13756] syz.3.4920[13756] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.335629][T13812] device syzkaller0 entered promiscuous mode SYZFAIL: proc resp pipe read failed n=-1 (errno 11: Resource temporarily unavailable) [ 375.223400][ T7] device bridge_slave_1 left promiscuous mode [ 375.229308][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 375.236578][ T7] device bridge_slave_0 left promiscuous mode [ 375.242488][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 375.249965][ T7] device veth1_macvtap left promiscuous mode [ 375.255802][ T7] device veth0_vlan left promiscuous mode [ 376.633417][ T7] device bridge_slave_1 left promiscuous mode [ 376.639326][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.646585][ T7] device bridge_slave_0 left promiscuous mode [ 376.652474][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.660477][ T7] device bridge_slave_1 left promiscuous mode [ 376.666392][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.673551][ T7] device bridge_slave_0 left promiscuous mode [ 376.679434][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.687037][ T7] device bridge_slave_1 left promiscuous mode [ 376.692967][ T7] bridge0: port 2(bridge_slave_1) entered disabled state [ 376.700117][ T7] device bridge_slave_0 left promiscuous mode [ 376.706101][ T7] bridge0: port 1(bridge_slave_0) entered disabled state [ 376.713786][ T7] device veth1_macvtap left promiscuous mode [ 376.719568][ T7] device veth0_vlan left promiscuous mode [ 376.725389][ T7] device veth1_macvtap left promiscuous mode [ 376.731165][ T7] device veth0_vlan left promiscuous mode [ 376.736911][ T7] device veth0_vlan left promiscuous mode