last executing test programs: 4.880726926s ago: executing program 2 (id=4396): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)='cpu.weight.nice\x00', 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x3, 0x0, 0x1, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1000008}, 0x9141, 0x3, 0x80, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x9, [@func={0x5, 0x0, 0x0, 0xc, 0x5}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x8, 0x3}, {0xe}, {0x8, 0x3}, {0x10, 0x2}, {0x7, 0x1}]}, @enum={0x7, 0x2, 0x0, 0x6, 0x4, [{0x5, 0x80000001}, {0xb, 0x18000}]}, @typedef={0xd, 0x0, 0x0, 0x8, 0x1}]}, {0x0, [0x2e, 0x0, 0x2e, 0x30, 0x72, 0x5f, 0x5f]}}, &(0x7f00000009c0)=""/222, 0x89, 0xde, 0x0, 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x28, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r5, 0x5}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={0xffffffffffffffff, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 4.018319491s ago: executing program 2 (id=4404): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180200000000000000000000000000009500000000000000f3f2533a4df6e6e02923810b0fede64c2f3fed7748eee915aee3be26ae3e3eeb99d81f769e0a70cba55fa43891ba005549c1ac14fc7136e77d3ec0b587f26932a1d74d885077a79c9a0754f91c97893bd9f9a0cca44d65a10ad8e36e5c6f74226d9865882d3b9a8412e9f291cf570a208b899cd6b4afcaa755d2a318e24a9e07784d56e41fc49e905d851ddd77fb13d9afa39688616bde822101cfbe0613663b8fec056bba7c095efda4ea77fef41669bf0bb80e145e7d342098a0396cfd"], &(0x7f0000000080)='GPL\x00', 0x4}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') syz_open_procfs$namespace(0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001240)={&(0x7f00000006c0)=ANY=[], 0x0, 0x48, 0x0, 0x0, 0x488b}, 0x20) r2 = syz_open_procfs$namespace(0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0xc0189436, 0x20000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x632, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) 3.888509042s ago: executing program 2 (id=4406): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0xc, &(0x7f0000000980)=ANY=[@ANYBLOB="18000000000000ecff0000000000000018110000", @ANYBLOB="eebda848bd4dad22eb64a32f033da84841463d0d1dcca2b6f40f3f18ee86af01aada05cd5f7ce8ec5c91549a526599e6c0018be17da089593c7dbb2284851ab8c64469a619c951634e53906674d50e5ed08eb02ae30452ab204c41fbab4025f8b9900bb6e1458a1aed09fa4fb5a6f646d6888828599c5c59820bef6845ab5f3f190a7a470e6a09edd19f8e82e8099ecf690df8efedbfe64e06728b90d62aeab8812b469877cf983e9e3d7ff01e7930e04d67e30e84e8d0", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f00000002c0)}, 0x20) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000480)=ANY=[@ANYRESDEC=r1], &(0x7f0000000340)='syzkaller\x00'}, 0x90) (async, rerun: 64) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r4}, 0x10) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async, rerun: 64) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) (async, rerun: 64) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffdb4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe15, 0x5, 0x0, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff4b, 0x0}}, 0x10) (async) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r8, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r8, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000650000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) (async) r11 = openat$tun(0xffffffffffffff9c, &(0x7f0000000380), 0x20000, 0x0) ioctl$TUNSETIFF(r11, 0x400454ca, &(0x7f00000003c0)={'pimreg\x00', 0x400}) (async) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r8, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) sendmsg$tipc(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000000040)="fb", 0x1}], 0x1}, 0x0) (async, rerun: 64) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000100)={0x1, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', r12, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r13 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000500)=0xffffffffffffffff, 0x4) (async) r14 = bpf$ITER_CREATE(0xb, &(0x7f0000000100), 0x8) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x14, &(0x7f0000000040)=r14, 0x3b) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x1d, 0x6, &(0x7f0000000180)=ANY=[@ANYBLOB="07050100fcffdfff18280000", @ANYRES32=r9, @ANYBLOB="00000000ffffff7f950000000000000018000000000200000000000006000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0xc7, &(0x7f0000000300)=""/199, 0x41000, 0x4a, '\x00', 0x0, 0xd, r14, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000280)={0x5, 0xb, 0x9, 0x1}, 0x10, 0x0, r14, 0x9, 0x0, &(0x7f0000000580)=[{0x8, 0x1, 0x2, 0xe}, {0x2, 0x5, 0xd, 0x7}, {0x5, 0x4, 0xc, 0x7}, {0x4, 0x5, 0x2, 0xa}, {0x3, 0x3, 0xf, 0x2}, {0x4, 0x3, 0x9, 0xb}, {0x1, 0x5, 0x9, 0x5}, {0x2, 0x3, 0x3, 0x9}, {0x2, 0x2, 0x0, 0xa}], 0x10, 0x3}, 0x8b) ioctl$TUNSETSNDBUF(r14, 0x400454d4, &(0x7f0000000940)=0x7f) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x6, 0x4, &(0x7f0000000b40)=ANY=[@ANYBLOB="18330000050000000000000000000000185a0c000c00000000000000000000005a52021b5ee50d6bd1818d8ce233b9689032f6649378b478e1a999de4372723818bc486c1a252fcc6f174a6ed166c2b0cfc904f9fd91ecbb91991eede754e731181971370cd4ac399db218"], &(0x7f00000004c0)='GPL\x00', 0x1, 0x95, &(0x7f0000000600)=""/149, 0x41000, 0x0, '\x00', r12, 0x25, r13, 0x8, &(0x7f0000000540)={0x4, 0x5}, 0x8, 0x10, &(0x7f00000006c0)={0x3, 0xa, 0x9, 0xfffeffff}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000000700)=[r2, r2, r8, r0, r0, r2, r9, r2, r8, r9], 0x0, 0x10, 0xfffeffff}, 0x90) (async, rerun: 64) recvmsg(r6, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x0) (async, rerun: 64) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r5}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r3, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="b9ff03316844268cb89e14f0080047e0ffff00124000632f77fbac14fe16e000030a07080403fe80000020006558845013f2325f1a3901050b038da1880b25181aa59d943be3f4aed50ea5a6b8686731cb89ef77123c899b699eeaa8eaa0073461119663906400f30c0600000000000059b6d3296e8ca31bce1d8392078b72f24996ae17dffc2e43c8174b54b620636894aaacf28ff62616363c70a440aec4014caf28c0adc043084617d7ecf41e9d134589d46e5dfc4ca5780d38cae870b9a1df48b238190da450296b0ac01496ace23eefc9d4246dd14afbf79a2283a0bb7e1d235f3df126c3acc240d75a058f6efa6d1f5f7ff4000000000000000000", 0x0, 0x24, 0x60000000}, 0x2c) 3.813236718s ago: executing program 2 (id=4408): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000008c50000000f000000850000009e00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0), 0x48) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000500)=@generic={&(0x7f00000004c0)='./file0\x00', r2}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="1800000000000000000000000000000071120900000000009500000000000000"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x9}, 0x80) 3.730847426s ago: executing program 2 (id=4411): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)='cpu.weight.nice\x00', 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x3, 0x0, 0x1, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1000008}, 0x9141, 0x3, 0x80, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x9, [@func={0x5, 0x0, 0x0, 0xc, 0x5}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x8, 0x3}, {0xe}, {0x8, 0x3}, {0x10, 0x2}, {0x7, 0x1}]}, @enum={0x7, 0x2, 0x0, 0x6, 0x4, [{0x5, 0x80000001}, {0xb, 0x18000}]}, @typedef={0xd, 0x0, 0x0, 0x8, 0x1}]}, {0x0, [0x2e, 0x0, 0x2e, 0x30, 0x72, 0x5f, 0x5f]}}, &(0x7f00000009c0)=""/222, 0x89, 0xde, 0x0, 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x28, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r5, 0x5}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={0xffffffffffffffff, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 3.730503466s ago: executing program 3 (id=4412): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)='cpu.weight.nice\x00', 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x3, 0x0, 0x1, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1000008}, 0x9141, 0x3, 0x80, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r5, 0x5}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r4, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 2.935011685s ago: executing program 2 (id=4416): bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='cpu.max\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0)=0xffffffffffffefff, 0x12) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRESDEC=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xfffffffffffffe4a) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4094, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0x9}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'macvlan0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r3, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000200)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000400)=[0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x98, &(0x7f00000004c0)=[{}], 0x8, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0xd6, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000700)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7200, '\x00', r5, 0xffffffffffffffff, 0x5, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000440)=ANY=[], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x15) perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x11, 0x0, 0x0, 0x0) syz_clone(0x24001100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000007c0)={0x0, 0x80, 0xb, 0x0, 0xc, 0xa, 0x0, 0x4, 0xaa013, 0x4, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x24766855, 0x4, @perf_config_ext={0x1000000000000004, 0x200000000004}, 0x104402, 0x8, 0x8001, 0x7, 0x9, 0x3, 0x0, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r6, &(0x7f0000000980), 0x12) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x18, 0x4, 0x8, 0x8}, 0x48) 2.866911801s ago: executing program 3 (id=4418): socketpair$tipc(0x1e, 0x0, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000800)={0x0, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x1000000000000000, 0x0, 0x2, 0x3, 0x200}, 0x0, 0x0, 0xffffffffffffffff, 0xb) (async) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0xff, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x19, 0x0, 0x8, 0x0, 0x0, 0xffffffffffffffff, 0x5}, 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x4, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195}, 0x90) close(r1) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000e80)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x40000000}, 0x10}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r3, 0x26}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4}, &(0x7f0000000000), &(0x7f0000000080)=r1}, 0x20) sendmsg$inet(r2, &(0x7f0000000500)={0x0, 0x40000, 0x0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) perf_event_open$cgroup(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0}, 0x90) (async) bpf$MAP_GET_NEXT_KEY(0x4, 0x0, 0x0) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) perf_event_open(&(0x7f00000010c0)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x100d, 0x2, 0x0, 0x6, 0x10001, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$MAP_CREATE(0x300000000000000, &(0x7f0000000100)=@base={0x18, 0x4, 0x41, 0x0, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x4002, 0x1}, 0x48) (async) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffc00}, 0x90) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) (async) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_BIND_MAP(0xf, &(0x7f0000000000)={r7, r6}, 0xc) (async) ioctl$TUNSETCARRIER(0xffffffffffffffff, 0x400454e2, &(0x7f0000000240)=0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x17, 0x5d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x90) unlink(&(0x7f0000000140)='./cgroup\x00') 2.729593822s ago: executing program 3 (id=4419): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x800, 0x3, 0x0, 0x80, 0xffffffffffffffff, 0xfffffff9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="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"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000380)='GPL\x00'}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x3, 0x220104, 0xb, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000380), &(0x7f0000000380), 0x2, r3}, 0x38) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x3, 0x0, {0x42}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x14044080}, 0x10) r9 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x104228}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) unlink(0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000f40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x90) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f00000000c0)=r11, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r5}, 0x18) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup, r12, 0x22, 0x2, 0x0, @prog_id}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x101}, 0x8) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000080)={0x0, &(0x7f00000001c0)=""/40, &(0x7f00000001c0), &(0x7f0000000400), 0x1, r3}, 0x38) 2.438177838s ago: executing program 3 (id=4421): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180200000000000000000000000000009500000000000000f3f2533a4df6e6e02923810b0fede64c2f3fed7748eee915aee3be26ae3e3eeb99d81f769e0a70cba55fa43891ba005549c1ac14fc7136e77d3ec0b587f26932a1d74d885077a79c9a0754f91c97893bd9f9a0cca44d65a10ad8e36e5c6f74226d9865882d3b9a8412e9f291cf570a208b899cd6b4afcaa755d2a318e24a9e07784d56e41fc49e905d851ddd77fb13d9afa39688616bde822101cfbe0613663b8fec056bba7c095efda4ea77fef41669bf0bb80e145e7d342098a0396cfd"], &(0x7f0000000080)='GPL\x00', 0x4}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r1) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r1, 0x800454e0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') syz_open_procfs$namespace(0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001240)={&(0x7f00000006c0)=ANY=[], 0x0, 0x48, 0x0, 0x0, 0x488b}, 0x20) r2 = syz_open_procfs$namespace(0x0, 0x0) ioctl$TUNGETDEVNETNS(r2, 0xc0189436, 0x20000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x632, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) 2.437839538s ago: executing program 4 (id=4422): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180200000000000000000000000000009500000000000000f3f2533a4df6e6e02923810b0fede64c2f3fed7748eee915aee3be26ae3e3eeb99d81f769e0a70cba55fa43891ba005549c1ac14fc7136e77d3ec0b587f26932a1d74d885077a79c9a0754f91c97893bd9f9a0cca44d65a10ad8e36e5c6f74226d9865882d3b9a8412e9f291cf570a208b899cd6b4afcaa755d2a318e24a9e07784d56e41fc49e905d851ddd77fb13d9afa39688616bde822101cfbe0613663b8fec056bba7c095efda4ea77fef41669bf0bb80e145e7d342098a0396cfd"], &(0x7f0000000080)='GPL\x00', 0x4}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001080)={r0, 0xe0, &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x4, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67, 0x8, 0x0, 0x0}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='devlink_health_report\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') syz_open_procfs$namespace(0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001240)={&(0x7f00000006c0)=ANY=[], 0x0, 0x48, 0x0, 0x0, 0x488b}, 0x20) r5 = syz_open_procfs$namespace(0x0, 0x0) ioctl$TUNGETDEVNETNS(r5, 0xc0189436, 0x20000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x632, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) 2.17931922s ago: executing program 0 (id=4424): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b90f8ff00000000bfa200000000000007020000f8eeffffb703000008000000b70400000201000085000000820000009500000000000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) close(r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000340)) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) write$cgroup_subtree(r0, &(0x7f0000000440)=ANY=[], 0xfdef) 2.023400454s ago: executing program 1 (id=4425): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 2.022225234s ago: executing program 1 (id=4426): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000002c0)='memory.current\x00', 0x275a, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x12, 0x4, 0x4, 0x6, 0x440, r1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x10}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r2}, &(0x7f0000000800), 0x0}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xb, &(0x7f00000006c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xb, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000002400007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000000)='fib6_table_lookup\x00', r5}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f00000015c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000000c0)={r6, 0x20e, 0x5ee, 0xfd000004, &(0x7f00000004c0)="b9180bb7600a070c009e40f086dd1fff310005e03300fd010010ac14142ee0080001c699da153f0ae0e6e380f60115f683317585d7473be0ab4439f0f570ff155bc5f73ba3f8bb99a6e8ded1ce485cf058105cd981b42493481cd659416a2e10c9119664f36eb00b333c20c9ec0c222d644bdcb178c1cc53d6960fbb842d6a33dfcde3a1e1848135214baf139753866cadcbe3ce52505e992818cc452bee339d9ab076f484020eaa348a21d7911e4c44905256ec2cc54cca47a198b00c10aff62a4bed43a2ebcad92743fb22c593f28fd4bb7c703cde9cae0569d4c8d9a823f2c12863f7a6c0cf88ed22aae4f6f084508833b61429a25773eedf63dd9f33d430f2a0a30a7761db16fe0f743b95ded898c28aac1256ce2751b3d738899b8b19d9052b7f13ff94", 0x0, 0x31, 0x6000000000000000, 0xfffffffffffffe7e, 0x1d4}, 0x28) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x11100, 0x0, 0xfffffffc, 0x0, 0x0, 0x81}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x10, 0x0, 0x0, &(0x7f00000003c0)='GPL\x00', 0x7, 0x52, &(0x7f00000004c0)=""/82, 0x41100, 0x41, '\x00', 0x0, 0x19, 0xffffffffffffffff, 0x8, &(0x7f00000005c0)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, &(0x7f0000000600)=[{0x0, 0x4, 0xb, 0x4}, {0x4, 0x3}], 0x10, 0x8}, 0x90) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz0\x00', 0x1ff) r7 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r8 = openat$cgroup_ro(r7, &(0x7f0000000080)='cgroup.kill\x00', 0x275a, 0x0) write$cgroup_subtree(r8, &(0x7f00000000c0)=ANY=[@ANYBLOB='-'], 0x44) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r10, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r9, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000001b00)={0x0, 0xfffffffffffffdd1, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r11, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080), 0x100}, 0x0) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) 1.915237373s ago: executing program 4 (id=4427): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)='cpu.weight.nice\x00', 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x3, 0x0, 0x1, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1000008}, 0x9141, 0x3, 0x80, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x9, [@func={0x5, 0x0, 0x0, 0xc, 0x5}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x8, 0x3}, {0xe}, {0x8, 0x3}, {0x10, 0x2}, {0x7, 0x1}]}, @enum={0x7, 0x2, 0x0, 0x6, 0x4, [{0x5, 0x80000001}, {0xb, 0x18000}]}, @typedef={0xd, 0x0, 0x0, 0x8, 0x1}]}, {0x0, [0x2e, 0x0, 0x2e, 0x30, 0x72, 0x5f, 0x5f]}}, &(0x7f00000009c0)=""/222, 0x89, 0xde, 0x0, 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x28, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r4, 0x5}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r2, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 1.849986009s ago: executing program 0 (id=4428): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)='cpu.weight.nice\x00', 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x3, 0x0, 0x1, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1000008}, 0x9141, 0x3, 0x80, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r5, 0x5}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r4, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r4}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 1.849805179s ago: executing program 3 (id=4429): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000700000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r0, 0xe0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, &(0x7f0000000340)=[0x0], &(0x7f0000000380)=[0x0], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8, 0x0, 0x0}}, 0x10) 1.849441309s ago: executing program 4 (id=4430): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000020850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f00000003c0), &(0x7f0000000400)='%-5lx \x00'}, 0x20) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000005c0)={0x1, 0x58, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r3 = bpf$ITER_CREATE(0x21, &(0x7f0000000600), 0x8) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x101, 0x3, 0x8, 0x184, r1, 0x5, '\x00', r2, r3, 0x0, 0x5, 0x2}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r6}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00'}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r8, &(0x7f0000000180), 0x40010) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000980)={r8, r0, 0x0, r0}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000040)={'bridge_slave_0\x00', @random="4f33e363a4b1"}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r7}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r7, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f00000002c0)=r5}, 0x20) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000002ec0)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r12 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000680)=@generic={&(0x7f0000000640)='./file0\x00'}, 0x18) r13 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@bloom_filter={0x1e, 0x6, 0x9, 0x7fff, 0x0, r10, 0x194, '\x00', r2, 0xffffffffffffffff, 0x4, 0x2, 0x4, 0x6}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x6, 0x23, &(0x7f0000000740)=ANY=[@ANYBLOB="180000009367ffff00000000ff0100008d3b0800100000002585dcfffdffffff8520000002000000b7080000000000007b8af8ff00000000b7080000010001007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r12, @ANYBLOB="0000000000000000b70500000800000085000000a5000000083800800000000018440000010000000000000000000000b7080000000000007b8af8ff00000000b7080000020000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r13, @ANYBLOB="0000000000000000b71300000800000085000000a5002000950000df00000000"], &(0x7f0000000880)='syzkaller\x00', 0x800, 0x1000, &(0x7f0000000f80)=""/4096, 0x8fdf58f37ee28f0a, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000008c0)={0x5, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, &(0x7f0000000900)=[{0x4, 0x3, 0xd, 0xa}, {0x2, 0x2, 0x7, 0xa}, {0x3, 0x2, 0x4, 0x1}, {0x3, 0x1, 0x7, 0x7}, {0x2, 0x2, 0xf}, {0x4, 0x4, 0x5, 0x8}], 0x10, 0xc0c}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r11, 0x18000000000002a0, 0xe2c, 0x60000000, &(0x7f0000000100)="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", 0x0, 0x24, 0x60000000}, 0x2c) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x20, 0x6, &(0x7f0000000000)=ANY=[@ANYBLOB="b488e0ccfab7be608b110900000000008510000002000000850000005600000095004c000000000095000062c6f8425f"], &(0x7f0000000080)='GPL\x00', 0x7, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x24}, 0x90) 1.792900024s ago: executing program 3 (id=4431): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = openat$cgroup_int(r1, &(0x7f0000000080)='cgroup.max.depth\x00', 0x2, 0x0) write$cgroup_int(r2, &(0x7f00000002c0)=0xffffffffffffefff, 0x12) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB, @ANYRESDEC=0x0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000240)={'macvlan0\x00'}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000006c0)={r3, 0xe0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f00000007c0)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x5, &(0x7f0000000400)=[0x0, 0x0, 0x0], &(0x7f0000000480)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x98, &(0x7f00000004c0)=[{}], 0x8, 0x10, &(0x7f0000000500), &(0x7f0000000540), 0x8, 0xa3, 0x8, 0x0, 0x0}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000700)={0x3, 0x4, 0x4, 0xa, 0x0, 0x1, 0x7200, '\x00', r5, 0xffffffffffffffff, 0x5, 0x2}, 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000528eadaddf2de6508dd82993333db3210550", @ANYRES32=r6], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x15) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x11, 0x0, 0x0, 0x0) syz_clone(0x24001100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0xb, 0x0, 0xe, 0xa, 0x0, 0x4, 0xaa013, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x24766855, 0x4, @perf_config_ext={0x4}, 0x104402, 0x8, 0x8001, 0x7, 0x9, 0x3, 0x0, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_pid(r7, &(0x7f0000000980), 0x12) 1.212142254s ago: executing program 1 (id=4432): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@bloom_filter={0x1e, 0x800, 0x3, 0x0, 0x80, 0xffffffffffffffff, 0xfffffff9, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x4, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000300)='qdisc_dequeue\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000640)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0ff0100000079a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00000000850000000d000000b70000000000000095000000000000005ecefab8f2e85c6c1ca711fcd020f4c0c8c56147d66527da307bf731fef97861750379585e5a076d839240d29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b3185fec0e07004e60c08dc8b8dbf11e6e94d75938321a3aa502cd2424a66e6d2ef831ab7ea0c34f17e3946ef3bb622003b538dfd8e012e79578e51bc53099e90f4580d760551b5b341a29f31e3106d1ddd6152f7cbdb9cd38bdb2209c67deca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e860e3665f1328d6704902cbe7bc04b82d2789cb132b8667c2147661df28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fb20b1c581e7be6ba0dc001c4110555850915148ba532e6ea09c346dfebd38608b3280080005d9a9500000000000000334d83239dd27080851dcac3c12233f9a1fb9c2aec61ce63a38d2fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd2e6d7f715a7f3deadd7130856f756436303767d2e24f29e5dad9796edb697aeea0182babd18cac1bd4f4390af9a9ceafd0002cab154ad029a1090000002780870014f51c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f0b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a6a71bc85018e5ff2c91018afc9ffc2cc788bee1b47683db01a469398685211dfbbae3e2ed0a50e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcd36e7487afa447c2edfae4f390a8337841cef386e22cc22ee17476d738952229682e24b92533ac2a9f5a699593f084419cae0b4532bcc97d3ae486aca54183fb01c73f979ca9857399537f5dc2acb72e7ead0509d380578673f8b6e74ce23877a6b24db0000000000000003629fbef2461c96a088a22e8b15c3e233db7ab22e30d46a9d24d37cef099ece729aa218f9f44a3210223fdae7ed04935c3c90d3add8eebc8619d7b90dfae158b94f50adab988dd8e12b1b56073d0d10f7067c881434af5cc9398fff00404d5d99f82e20ee6a8c88e18c2977aab37d9ac4cfc1c7b400000000000007ff57c39495c826b956ba859ac8e3c177b91bd7d5e41ff868f7ca1664fe2f3ced846891180604b6dd2499d16d7d9158ffffffff00000000ef069dc42749a89f854797f29d0000002d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf77bfc95769a9294df517d90bdc01e73835efd98ad5a3e1a90800c66ee2b1ad76dff9f9000071414c99d4894ee7f8249dc1e3428d2129369ee1b85af6eb2eea0d0df414b31592479ecf2392548f11e1036a8debd64cbe359454a3f2239cfe35f81b7a490f167e6d5c1109000000000000000042b8ff8c21ad702ccacad5b39eef213d1ca296d2a27798c8ce2a305c0c7d35cf4b22549a4bd92052188bd1f285f653b621491dc6aaee0200e2ff08644fb94c06006eff1be2f633c1d987591ec3db58a7bb3042ec3f771f7a1338a5c3dd35e926049fe86e09c58e273cd905deb28c13c1ed1c0d9cae846bcbfa8cce7b893e578af7dc7d5e87d44ff828de453f34c2b18660b080efc707e676e1fb4d5825c0ca177a4c7fbb4e62b445c00f576b2b5cc7f819abd0f885cc4806f40300966fcf1e54f5a2d38708194cd6f496e5dee734fe7da3770845cf442d488afdc0e17000000000000000000000000000000000000000000000000000005205000000dc1c56d59f35d367632952a93466ae595c6a8cda690d192a070886df42b27098773b45198b4a34ac977ebd4450e121d01342703f5bf030e935878a6d169c80aa4252d4ea6b8f6216ff202b5b5a182cb5e838b307632d03a7ca6f6d0339f9953c3093c3690d10ecb65dc5b47481edbe1f000000000000004d16d29c28eb5167e9936ed327fb237a56224e49d9ea955a5f0dec1b3ccd35364600000000000000000000000000000000000000000000000000000000000026ded4dd6fe1518cc7802043ecfe69f743f1213bf8179ecd9e5a225d67521dc728eac7d80a5646ac2cbde21d3ebfbf69ff861f4394836ddf128d6d19079e64336e7c676505c78ad67548f4b192be1827fcd95cf107753cb0a6a979d3db0c407081c6281e2d8429a863903ca75f4c7df3ea8fc2018d07af1491ef060cd4403a099f32468f65bd06b4082d43e121861b5cc03f1a1561f0589e0d12969bc982ff5d8e9b986c0c6c747d9a1cc500bb892c3a16ff10feea20bdac0000000000000000ca06f256c8028e0f9b65f037b21f3289f86a6826c69fa35ba5cbc3f2db1516ffc5c6e3fa618b24a6ce16d6c7010bb37b61fa0a2d8974e69115d33394e86e4b838297ba20f96936b7e4766e92dea6c5d1d33d84d96b50fb000000ae07c65b71088dd7d5d1e1bab9000000000000000000000000b5ace293bec859c13e3229432ad71d646218b5229dd88137fc7c59aa242af3bb4efb82055a3b61227ad40f52c9f250057931d828ec78e116ae46c4897e2795b6ff92e9a1f63a6ed8fb4f8f3a6ec4e76f8621e24b0b855c02f2b7add58ffb25f339297729a7a51810134d3dfbf71f6516737be55c06d9cdcfb1e2bb10b50000eb4acff90756dba1ecf9f58afd3c19b5c4558ba9af6b7333c894a1fb29ade9ad75c9c022e8d03fe28bc358684492aa771dbfe80745fe89ad349ffaad76ff9dd643796caffdf67af5dd476c37e7e9a84e2e5da2696e285a59b53f2fb0e16d8262c080c159ce40c14089c82759106f422582b42e3e8484ea5a6ad9aa52106eafe0e0caea1ad4cb23f3c2b8a0f455ba69ea284c268d54b43158a8b1d128d02af263b3dc1cab794c9ac57a2a7332f4d8764c302ccd5aac114482b619fc575aa0dd2777e881e29a854380e2f1e49db5a1517ec40bb3fa44f9959bad67ccaba76408da35c9f1534c8bd48bbd61627a2e0a74b5e6aefb7eee403f02734137ff47257f164391c673b6071b6ad0f05eed164ca63e4ea26dce0fb3ce0f6591d80dfb8f386bb79f5589829b6b0679b5d65a81826fc9b38f791c8f1892b51ad65a89bc84646ebf78f5d5d4804d9abb071fd711b5e7cc163b42a6510b8f5ee6747df0b560eabe0499bf1fef7c18bb9f55effa018679845c6598fb78bf1b8d9d9f04a5f6062c2bbb91952755b3f7c948268cb647d0a0bb1286480615941154a01d23734bcafe3b164474e2f2efa77850686ee4541f3e79efa63545a7ae53d5f0c40cc86473f7eb093980bd0d97bb4750128d9c519984c5f731ea259e71b2f12d67ce12e52c283e74594dfc933e625737ed231d61263721d46daf093f770357cd78fe1431aef52b4a0a933f1a5334ad03f3876fc8a8e187f80318427b4c922075cf829e3cc49d71d52137b48e1fb6b05dd1c7b251a7059f0a4b4f3431f67fc65b75c202e43816e34ff41db85bacd77b25242830b788ae1e00"/2566], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r2, 0x18000000000002a0, 0xe40, 0x0, &(0x7f0000000100)="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", 0x0, 0x8, 0x60000000}, 0x1e) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x0, 0x0, 0x0, &(0x7f0000000380)='GPL\x00'}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x3, 0x220104, 0xb, 0x1}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000380), &(0x7f0000000380), 0x2, r3}, 0x38) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r8, &(0x7f0000004440)={&(0x7f0000000ec0)=@nameseq={0x1e, 0x3, 0x0, {0x42}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x14044080}, 0x10) r9 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x104228}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18080000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000700000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$PERF_EVENT_IOC_SET_BPF(r9, 0x40042408, r10) unlink(0x0) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000f40)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x90) setsockopt$sock_attach_bpf(r4, 0x1, 0x32, &(0x7f00000000c0)=r11, 0x4) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000380)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x0, r5}, 0x18) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup, r12, 0x22, 0x2, 0x0, @prog_id}, 0x20) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000280)={0x101}, 0x8) bpf$BPF_MAP_LOOKUP_AND_DELETE_BATCH(0x19, &(0x7f0000000080)={0x0, &(0x7f00000001c0)=""/40, &(0x7f00000001c0), &(0x7f0000000400), 0x1, r3}, 0x38) 1.211825704s ago: executing program 4 (id=4433): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)='cpu.weight.nice\x00', 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x3, 0x0, 0x1, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1000008}, 0x9141, 0x3, 0x80, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x9, [@func={0x5, 0x0, 0x0, 0xc, 0x5}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x8, 0x3}, {0xe}, {0x8, 0x3}, {0x10, 0x2}, {0x7, 0x1}]}, @enum={0x7, 0x2, 0x0, 0x6, 0x4, [{0x5, 0x80000001}, {0xb, 0x18000}]}, @typedef={0xd, 0x0, 0x0, 0x8, 0x1}]}, {0x0, [0x2e, 0x0, 0x2e, 0x30, 0x72, 0x5f, 0x5f]}}, &(0x7f00000009c0)=""/222, 0x89, 0xde, 0x0, 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x28, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r5, 0x5}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={0xffffffffffffffff, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 954.675967ms ago: executing program 0 (id=4434): r0 = perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x4, 0x6, 0x2, 0x9, 0x0, 0x6, 0x2901, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x401, 0x0, @perf_bp={&(0x7f0000000000), 0xf}, 0x5, 0xf9f6, 0x0, 0x6, 0x0, 0x1000000, 0x3, 0x0, 0x5, 0x0, 0x6}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0xa) close(r0) (async) r1 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f00000000c0), 0x2, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)={[{0xd09a02f849e7ec6a, 'net_prio'}]}, 0xa) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000001c0)={0x1, 0x58, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) (async) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f0000000200)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x58, 0x58, 0x9, [@typedef={0x5, 0x0, 0x0, 0x8, 0x3}, @restrict={0xb, 0x0, 0x0, 0xb, 0x2}, @int={0x5, 0x0, 0x0, 0x1, 0x0, 0x1b, 0x0, 0x7e, 0x1}, @struct={0x4, 0x3, 0x0, 0x4, 0x0, 0x6b7, [{0x5, 0x4, 0xaf}, {0x7, 0x1}, {0xb, 0x0, 0x400}]}]}, {0x0, [0x2e, 0x5f, 0x0, 0x61, 0x0, 0x61, 0x0]}}, &(0x7f0000000280)=""/120, 0x79, 0x78, 0x1, 0x8}, 0x20) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0x17, 0x2, 0x7, 0x9, 0x204, 0xffffffffffffffff, 0xee55, '\x00', r2, r3, 0x3, 0x2, 0x5}, 0x48) r5 = openat$cgroup_int(0xffffffffffffffff, &(0x7f00000003c0)='cpuset.mems\x00', 0x2, 0x0) write$cgroup_int(r5, &(0x7f0000000400)=0x2, 0x12) (async) sendmsg$inet(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000440)={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000480)="6a220b93a9fefb0a9e6a6aa4a9cb8fdd54c0ec34db2912e217dbb07ca8d753f03aaae54cf4a049bb01c27b7352d54e2de2b4c974b2c22aa6358a089f70a5bd083d1429209223f408688231fd6f8072370643851a559112fff0c3eb001880ebe703c38e50e1035b15c0d76bf9cdbc539f118ea10d70dcff2752679552d7128ca5d2fd348df03d27831d13c9eb6e12742fbeb40d6978f09dc02700b543b11eeca420ec7d8cc113d139fca9fb11e0e6bb7813eae92d2ebfc312225324f3f01106adc59ffff5be8533a5531cb0fa646f549e66348913642fce2e43b8a50ac01678b8fd", 0xe1}], 0x1}, 0x40) (async) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000600)={0x1b, 0x0, 0x0, 0x10, 0x0, r4, 0x8, '\x00', r2, r3, 0x4, 0x3, 0x1}, 0x48) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c80)={0x11, 0x2f, &(0x7f00000008c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0xfff, 0x0, 0x0, 0x0, 0x3ffa}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@map_fd={0x18, 0x4, 0x1, 0x0, r4}, @call={0x85, 0x0, 0x0, 0x14}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x6}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0xad3fc78059562fe6}}}, &(0x7f0000000a40)='GPL\x00', 0xffff8000, 0xd3, &(0x7f0000000a80)=""/211, 0x41000, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000b80)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000bc0)={0x1, 0xc, 0x955f, 0x4}, 0x10, 0x0, 0x0, 0x4, &(0x7f0000000c00)=[r6, r6, r6, r4, r6, r4], &(0x7f0000000c40)=[{0x1, 0x2, 0xf, 0x3}, {0x3, 0x3, 0x5, 0x2}, {0x5, 0x2, 0xa, 0xf}, {0x1, 0x4, 0x8, 0xc}], 0x10, 0x9}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x1f, 0x1f, &(0x7f0000000680)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x4}, {{0x18, 0x1, 0x1, 0x0, 0x1}}, {}, [@map_fd={0x18, 0x5, 0x1, 0x0, r4}, @ldst={0x3, 0x1, 0x4, 0x1, 0x5, 0x1, 0xffffffffffffffff}, @map_idx_val={0x18, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x1}, @alu={0x4, 0x0, 0x8, 0x0, 0x2, 0x18, 0x4}, @btf_id={0x18, 0x6, 0x3, 0x0, 0x3}, @printk={@lld, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x2}}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000780)='GPL\x00', 0x7, 0x5e, &(0x7f00000007c0)=""/94, 0x41000, 0x0, '\x00', r2, 0x29, r3, 0x8, &(0x7f0000000840)={0xa, 0x5}, 0x8, 0x10, &(0x7f0000000880)={0x5, 0xe, 0x1, 0x400}, 0x10, 0x0, r7, 0x9, &(0x7f0000000d40)=[r4, r4, r4], &(0x7f0000000d80)=[{0x0, 0x3, 0x2, 0x1}, {0x3, 0x3, 0xe, 0xc}, {0x4, 0x3, 0x10, 0x5}, {0x0, 0x5, 0xa, 0x5}, {0x4, 0x4, 0x0, 0xc}, {0x1, 0x3, 0x3, 0x6}, {0x0, 0x2, 0x3, 0x4}, {0x5, 0x5, 0xe, 0xa}, {0x3, 0x3, 0x10, 0x7}], 0x10, 0x8}, 0x90) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000f00), 0x400000, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000f40)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r9, &(0x7f0000002140)={&(0x7f0000000f80)={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000002100)=[{&(0x7f0000000fc0)="765a9904b546dccb8283697f4dc159d3d52cca4a85791e681930e8eccf024ce155f02ebfe3", 0x25}, {&(0x7f0000001000)="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", 0x1000}, {&(0x7f0000002000)="353d555ae5faa5a28a5ca9c267bfe665568766958fda6c71cdcfb2a27aad98d2f5eac56ae9c46ec9e22e9c05034bfaacf60f38f65b9a37198c22cd48019ba0e9d962744d48d5fdd1821a444493eda522ae2f8c79b42ea7cccc106961f694e899133ec175000f73596e139bd162ae694e911b1355651946de0550fe90a682fff470ab54169ff705b45f3b8554a34cff702e3d18595d96a9b2ac7a3d1e0783ba9569f5a32b8b65c8dded2a404162f942c619665297c176006a7cb78f4f1a433c4ac77f5342c943f415d4067b5afdce2cc55e1eb17dbb36815be14512ac95b861664175c37ce125aa0244b3", 0xea}], 0x3}, 0x20004854) (async) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000002180)={0xffffffffffffffff}) sendmsg$tipc(r11, &(0x7f00000023c0)={&(0x7f00000021c0)=@nameseq={0x1e, 0x1, 0x2, {0x2, 0x2}}, 0x10, &(0x7f00000022c0)=[{&(0x7f0000002200)="fa0009d855ae513bb7a4c84d475e3a79557197ec7ea12a6ad4a103506d09f25cabfc84bed08bc08b62df34a4dbd27d4e437d7b8a02ad326ff473a24176ae6e395c6ab59e8d00167b0b7918a20c3379b2359401ce55f81864d5393ff99b06f9e8929798840a576b69b0e6b4e5cb52714a9c77b7b93e1abf8e782e82dacc40473ee86627cf", 0x84}], 0x1, &(0x7f0000002300)="0d987fb3263f5e6783b24a85b02da7e0371ebc8f0aa750820e20aeb3d908ed472a397e07abdcdfa07547c20e3aac153f42fc2b078c5d941b8842a070e580dfc688b64d9d304182a11b5caf8c531f3b3d80f5a15cb3b11035bffd44387819cf0d45696316d7711ed95e60b47dbb21ee07c3c28a535f2582272b3a2dde7f9925a3684928c1f4eaf52d", 0x88, 0xc4}, 0x4000000) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000002880)={r8, 0xe0, &(0x7f0000002780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, &(0x7f0000002580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8, &(0x7f00000025c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000002640)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x44, &(0x7f0000002680)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f00000026c0), &(0x7f0000002700), 0x8, 0x4a, 0x8, 0x8, &(0x7f0000002740)}}, 0x10) r14 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000028c0)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x7, '\x00', 0x0, r3, 0x1, 0x0, 0x1}, 0x48) r15 = bpf$PROG_LOAD(0x5, &(0x7f0000002980)={0x1e, 0xa, &(0x7f0000002400)=@raw=[@map_val={0x18, 0x5, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x6}, @ldst={0x1, 0x2, 0x1, 0x0, 0x6, 0x19, 0x1}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}, @map_fd={0x18, 0x8, 0x1, 0x0, r6}, @func={0x85, 0x0, 0x1, 0x0, 0xfffffffffffffff8}], &(0x7f0000002480)='GPL\x00', 0x7, 0x26, &(0x7f00000024c0)=""/38, 0x41100, 0x8, '\x00', r2, 0x30, r3, 0x8, &(0x7f0000002500)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000002540)={0x0, 0x7, 0x1ff, 0x80000000}, 0x10, r13, 0xffffffffffffffff, 0x0, &(0x7f0000002940)=[r6, r4, r14, r6], 0x0, 0x10, 0x5}, 0x90) openat$tun(0xffffffffffffff9c, &(0x7f0000002a40), 0x523c00, 0x0) (async) r16 = openat$cgroup(r15, &(0x7f0000002a80)='syz0\x00', 0x200002, 0x0) openat$cgroup_type(r16, &(0x7f0000002ac0), 0x2, 0x0) (async) r17 = openat$tun(0xffffffffffffff9c, &(0x7f0000002b00), 0x2000, 0x0) ioctl$TUNSETIFF(r17, 0x400454ca, &(0x7f0000002b40)={'\x00', 0x100}) (async) write$cgroup_freezer_state(r7, &(0x7f0000002b80)='FROZEN\x00', 0x7) (async) r18 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000002d40)=@o_path={&(0x7f0000002d00)='./file0\x00', 0x0, 0x0, r10}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000002dc0)={0x6, 0x13, &(0x7f0000002bc0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [@exit, @func={0x85, 0x0, 0x1, 0x0, 0x7}, @map_fd={0x18, 0x9, 0x1, 0x0, r4}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x2}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000002c80)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x1, '\x00', r12, 0x25, r3, 0x8, 0x0, 0x0, 0x10, &(0x7f0000002cc0)={0x3, 0xc, 0x808, 0x3}, 0x10, 0x0, 0x0, 0x0, &(0x7f0000002d80)=[r17, r14, r4, r4, r4, r6, r14, r18], 0x0, 0x10, 0x100}, 0x90) (async) close(r18) 823.136198ms ago: executing program 0 (id=4435): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x5}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x69, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0x0, 0xffffffffffffffff, 0x0, 0x7, &(0x7f0000000000)='cgroup\x00'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r1, r2, 0x2, 0x2}, 0x10) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x1ff) r3 = openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x9, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="180000000000000000000000000000006112000000000000950000000000000051fa7824c74186dc02ec0696c37b64e3b24da3180100000005165c0f63cdc2e82818254950ee03568b8809a1ff4c7c4750eabfafcb9531b31e6a86827d1010c5a909ab98e00e19644a88e95ba26d1c9eecddb2d11c541418ceeb29b9b6829c6e433822bdb3cc85244aab60c1aae1314d7381fcfeb970bea672cf1e926f6a51479343144648a07a975bd89dc398712376610f6254f12495b4658319684387f6f3543205d4bc4ce05b8b961103673dff7f158052e62b20f05fd24108d8363d44fcd0f8f3647899762a17282a1914452d11f557c28f396eebdc858558db0276d14f9035f2b5f703e5be7e4acf8b78c2834ae5805fffee38a9a0033d520bcf6b08ede50899d4b9bdf85c71c5de2503dab358f42a2624c7daa9ed44039aab46419496362e54cfad05a0004ac71a003d7b85d07191bed4e5a890826300214146f7ed569985439baa355c2766dd056f5d79e454f3d873095e7a237bc06d035a8d601f21746d886419f38b34a495040000000071c2f0cce8c93cc17e9afa314fcb2ba15d646c66b0f65021829f87d988b4e2d71753b1549fa734f0b2e56dbd21ed2e09d0cddad721971637f384eed3034597c93e1c52f42cad0ed09c395dc6e9703660fefa1c80f467367c006f25caf0cbcefd13d68839893e39c588eb032905f91cafa4996dbf0c9be9654db05fb918086cc8228d02a3092c0830b8f587a5624515298b2d4eb2bde6f9a2eb83d53f717f13fa7552d92c51dbd32ea50c490ecd085d2811a7555c538cffffff7f00000000dd872244bfa64779e0f43a9c277e2910b7ccdc3d6726d34ad2101033a623ca2a49ad344884289130bc71cee2b7de62bf48129ae1af052a2d46a61625735a9eea7f793946b3229e861d8ea49806b3f7d4295f6b000000000000f337b1ceb2d8a65dcdcd895d7ba37098d2593fdaaef445af5bee02019c00000099b13ecda2a5b37de0519e974cba92ebaf0f701611a9b027ce04340bda4594cc9049c3f101629ab028145e004209ebe71a6fe84af50804000000000000004a27213354964e250a98fe357676f94b6947383e320fbb1118f586d5b9b1b977e1e1a4490ff67703a9b5900f8a6f8a805879dd91ec5ff435b219c53680c0ae04dcc4ef69b98fcb0d6b6a03a8b71a66b4e2876dc4b610444bf10000000000b046b6ae5d68156bcbd6d8793ade9a22ac8fc7857e5bbc14adc4e12b08f350c6789283b9990c72e64372a1f79769a8bdc632fc1a0b3417855d8b7d25ca4d404c23631ad3d2f55dcd385371c86170a4bca58c2b2b4eabc365f45bd10bb45b0c5bc354456a52be18d9b44014d20a3c51c8f013dade83562e73278662829e4f5a9ac00fd91178468c737f0872d97d38d11a176be5a0d7294c51eb161eddcfefa8837c7430721851ec2a107af0df6d43e732bbc01e76c66895eb85d36798d61622773591ee21ad9f6a1b73fa9cf3ffeb8a00b63af800a81d0fb8aa29df8b8ad6fbafefb5802a23cbdeeabceda5bfc5ff2fa5c1d61d04a1324794c6ed000696d9f04010c35474e690545c3d9bd836d4cef2585ba616e01c3d000000000000000000470ebc6f3453ecbf3047e4547d7632d3ad21798e730cb5d1da059b5bdb8107815dff995c0788906790406dfb4f8ee9f24ff94233e2e6e581e6e5de33a5f254c9a8b612547473c3001df3928dac9203b744619082421a8da7c00000000000000000000000000000018a73ef40cca690fb7595c6962984f8276677be6f66cbdbccf1896433808c9c84d74ac4a7c186a04a2250972f7acb156b21f9826b6acb7db32c4e3b3ec8b59fd972975edb1da872d81a35e4fda2f5cbde6b40bea20418c6e9dad30b791eea58f53e80fee4dd7fe08373ea2784fcd3a65261de71eb866458d2c22a"], &(0x7f0000000100)='GPL\x00'}, 0x70) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000040)={@cgroup=r3, r4, 0x2, 0x2}, 0x10) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000200)={@cgroup=r5, r4, 0x2, 0x10, 0x0, @link_id}, 0x20) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r6 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000080)={0x0, 0xffffff96}, 0xc) r7 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="9feb010018000000000000004400000044000000070000000300000007000006040000000c000000070000000f000000fdf7ffff050000000100000009000000000000000b0000000100000001000000ff0000000500000002000000000061002e0000"], &(0x7f0000000280)=""/154, 0x63, 0x9a, 0x0, 0x8001}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@bloom_filter={0x1e, 0x0, 0x6, 0x17, 0x0, r6, 0xffffffff, '\x00', 0x0, r7, 0xfffffffd, 0xfffffffd, 0x0, 0x40000000000}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) r8 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r8, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r8, 0x80047456, 0x21) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='kfree_skb\x00', r9}, 0x10) 366.426898ms ago: executing program 4 (id=4436): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) 270.010486ms ago: executing program 4 (id=4437): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)='cpu.weight.nice\x00', 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x3, 0x0, 0x1, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1000008}, 0x9141, 0x3, 0x80, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x9, [@func={0x5, 0x0, 0x0, 0xc, 0x5}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x8, 0x3}, {0xe}, {0x8, 0x3}, {0x10, 0x2}, {0x7, 0x1}]}, @enum={0x7, 0x2, 0x0, 0x6, 0x4, [{0x5, 0x80000001}, {0xb, 0x18000}]}, @typedef={0xd, 0x0, 0x0, 0x8, 0x1}]}, {0x0, [0x2e, 0x0, 0x2e, 0x30, 0x72, 0x5f, 0x5f]}}, &(0x7f00000009c0)=""/222, 0x89, 0xde, 0x0, 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x28, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map, r5, 0x5}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={0xffffffffffffffff, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{}, &(0x7f00000006c0), &(0x7f0000000700)=r3}, 0x20) sendmsg$inet(r2, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 265.688406ms ago: executing program 1 (id=4447): bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000000500)=ANY=[@ANYBLOB="61183400000000006113500000000000bfa000000000000007000000080000002d0301000000000095000000000000006916000000000000bf370000d0000000350607000fff0720dc06000020000000260300000ee60060bf050000000000000f630000000000006507f9ff01000000070700004ddfffff1e75000000000000bf54000000000000070400000400f9ffad4301000000000095000000000000001500000000000000950000000000000032ed3c12dc8c27df8ecf264e0f84f9f17d3c30e32f1754558f2278af6d71d79a5e12814cb1d8a5d4601d295c45a6a0b9bdb7dd399703cac4f6f3be4b369289aa6812b8e007e733a9a4f1b0af3dda82ee45a010fb94fe9de57b9d8a814261bdb94a05000000c6c60bf70d742a81762bab8395fa64810b5b40d893ea8fe0185473d51b546cad3f1d5ab2af27546e7c955ccefa1f6ab689b555202da2e0ec2871b4a7e65836429a527dc47ebe84a423b6c8d345dc8da3085b0ab71ca1b901627b562ed04ae76002d4519af619e3cca4d69e0dee5eb106774a8f3e6916dfec88158f0200000000c8fb730a5c1bf2b2bb71a629361997a75fd552bdc206438b8ef4901fd03c16dfda44221b235c8ac86d8a297dff0445a15f21dce431e56723888fb126a163f16f3fa039a196ee920ae2fb494059bba8e3b680324a188076eb685d55c4e9b2ad9bc1172ba7cbebe174aba210d739a018f9bbec63222d20cecac4d03723f1c932b3a6aa57f1ad2e99e0e67ab93716d20000009f0f53acbb40b4f8e2738270b31562ed834f2af97787f696649a462e7ee4bcf8b07a10d6735154beb4000000000000000000000000004000bc00f674629709e7e78f4ddc211bc3ebe6bd9d42ca0140a7afaab43176e65ec1118d50d1e827f3472f4445d253887a5ad103649afa17690884f800031e03a651bb96589a7e2e509bcc1d161347623cb5e7ac4629c8ab04871bc47287cd31cc43ea0ffb567b40407d000000210000000000000000005f37d8703f37ca364a601ae899a56715a0a62a34c6c94cce6994521629ab028acfc1d926a0f625480a55c22fe3a5ac000000000000000000000000000000c1eb2d91fb79ea00000000000000000000e4007be511fe32fbc90e2364a55e9bb66ac64423d2d00fea2594e190deae46e26c596f84eba90000000000000000fffb0000000082fb0d3cc3aa39ee4b1386bab561cda886fa642994cacd473b543ccb5f0d7b63924f17c67b13631d22a11dc3c693962895496d4f6e9cc54db6c7205a6b068fff496d2da7d6327f31d7c8cc5d325c5379b0363ce8bd1f61b007e1ff5f1be1969a1ba791ad46d800000000c7f26a0337302f3b41eae59809fd05d12f6106f117b062df67d3a6473265dd1410eea68208a3f26b2989b832d8b34a34a4f08b34b3042065acaa10856e858d27adee7daf32903d3fc78700d429a2d4c8b6d803eb83eecfe4c7ff9e6ab5a52e83d089dad7a8710e0254f1b11cced7bc3c8da0c44d2ebf9f6f3ff3be4d1458077c2253b0c7c7a0a9fdd63bf910dc20e5cb2a88e59febc47f1212a21f631dbaa74f22bad050e9856b48ae3a03a497c37758537650fe6db89da3c41fdc3d78e046f6160e1741299e8dc29906870e6431ed1eab5d067a183f064b060a8ec12725d42e3a74863d66bee966b1574f8e01b3f34a267ff0afa1e1c758a0079b747067312e9815a21cb3f1f815f8989d78854ca4d3116dbc7e2bf2402a75fd7a55733360040855ed5d1c0d634fc5fb38f84d9d87b27f8a5d91217b728f13e3ee20e69e0ffb2780b1a7af137ff7b4ff139604c5d744b5272b44c23488b2bdbff947c4dfa108cbb88202eeb81f428a5b3c299848649e1a57ff52f657a67463d7dbf85ae9321fc2cc17dc4a29b9cba8ded5de8206c812439ab129ae818837ee15620789c524b3baf49a0be9bb7d958d5e87c6c09bf71a894bad62934782cc308e936d7637e07c4a2b4dc87b0da20000d9ef418cf19e7a8c4c328be0ce91798adc2dca87ddd9d064e081383409ed2912c811ae63f03212a5331c2a4ead000000000000000000008e69cc5c1e7319d39fa6f96c23c8ffd591ef011294c50a0a705549134c4aa3544a99edc9535105d3aeba9ec9441f912bdc65695e731c872278b64167aa46a07c68a9eace7fa485108f9d8cb4304c4b65d61d88aacea85b53893ee96edc310c23b1fc83b4b0f3d28c3861480840b7fe39a2bc2f6a558a20ae4d30b41f32e275faf92af8456141fde716d8d10a6b30981563db05312c39e8074fd5bb8bf95c24ccdb04e40e595927181d1138510fc6162da1a5898534fc2460b957e7b77bc5e192cc36ad2949c85e15142da926fbf6f830e1aaaa5dd9538e259e7f107e49b194c537ed4a"], &(0x7f0000000100)='GPL\x00'}, 0x48) 150.976727ms ago: executing program 1 (id=4438): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000000002000000000000000000018190000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) openat$cgroup_int(0xffffffffffffffff, &(0x7f0000000380)='cpu.weight.nice\x00', 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000590000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x64}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x3, 0x0, 0x1, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1000008}, 0x9141, 0x3, 0x80, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12}, 0x48) r3 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x68, 0x68, 0x9, [@func={0x5, 0x0, 0x0, 0xc, 0x5}, @func_proto={0x0, 0x5, 0x0, 0xd, 0x0, [{0x8, 0x3}, {0xe}, {0x8, 0x3}, {0x10, 0x2}, {0x7, 0x1}]}, @enum={0x7, 0x2, 0x0, 0x6, 0x4, [{0x5, 0x80000001}, {0xb, 0x18000}]}, @typedef={0xd, 0x0, 0x0, 0x8, 0x1}]}, {0x0, [0x2e, 0x0, 0x2e, 0x30, 0x72, 0x5f, 0x5f]}}, &(0x7f00000009c0)=""/222, 0x89, 0xde, 0x0, 0x4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x3, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x28, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002700000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r2, r4, 0x5}, 0x10) write$cgroup_type(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000540)={r2, 0x0}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r2}, &(0x7f00000006c0), &(0x7f0000000700)}, 0x20) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 147.632257ms ago: executing program 0 (id=4439): bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000002c80)={0x3, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="180200000000000000000000000000009500000000000000f3f2533a4df6e6e02923810b0fede64c2f3fed7748eee915aee3be26ae3e3eeb99d81f769e0a70cba55fa43891ba005549c1ac14fc7136e77d3ec0b587f26932a1d74d885077a79c9a0754f91c97893bd9f9a0cca44d65a10ad8e36e5c6f74226d9865882d3b9a8412e9f291cf570a208b899cd6b4afcaa755d2a318e24a9e07784d56e41fc49e905d851ddd77fb13d9afa39688616bde822101cfbe0613663b8fec056bba7c095efda4ea77fef41669bf0bb80e145e7d342098a0396cfd"], &(0x7f0000000080)='GPL\x00', 0x4}, 0x90) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000001080)={r0, 0xe0, &(0x7f0000000f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0xa, 0x4, &(0x7f0000000d80)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000e00)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67, 0x8, 0x0, 0x0}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x0, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r1, 0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) close(r4) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r4, 0x800454e0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000080)='mem\x00\x10\x00\x00\x00\x00\x00\x00I\xa2l') syz_open_procfs$namespace(0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000001240)={&(0x7f00000006c0)=ANY=[], 0x0, 0x48, 0x0, 0x0, 0x488b}, 0x20) r5 = syz_open_procfs$namespace(0x0, 0x0) ioctl$TUNGETDEVNETNS(r5, 0xc0189436, 0x20000000) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x26e1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x632, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x90) 43.299506ms ago: executing program 1 (id=4440): perf_event_open(0x0, 0x0, 0xffffffffffff7fff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fd, 0x222, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) setsockopt$sock_attach_bpf(r2, 0x1, 0x25, &(0x7f0000000540)=r3, 0x8) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000300)={r3}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xf, 0xf, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x9}, [@call={0x85, 0x0, 0x0, 0x8c}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x3}}, @map_idx_val={0x18, 0x1, 0x6, 0x0, 0xe, 0x0, 0x0, 0x0, 0xfff}, @alu={0x4, 0x1, 0xa, 0x9, 0x5, 0x8, 0x1}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x76, &(0x7f0000000200)=""/118, 0x41000, 0x5, '\x00', 0x0, 0x1f, r3, 0x8, &(0x7f0000000280)={0x0, 0x3}, 0x8, 0x10, &(0x7f00000002c0)={0x0, 0x10, 0x2a7d, 0x3}, 0x10, 0x0, r3, 0x5, &(0x7f0000000380)=[r1, r4, 0xffffffffffffffff, r0], &(0x7f00000003c0)=[{0x1, 0x3, 0x4, 0x1}, {0x1, 0x5, 0xf, 0x8}, {0x2, 0x1, 0xf, 0x8}, {0x3, 0x4, 0xb, 0x6}, {0x4, 0x2, 0x6, 0xb}], 0x10, 0x6}, 0x90) 0s ago: executing program 0 (id=4441): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000e21800000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="180000000000008000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@bloom_filter={0x1e, 0xfffffffe, 0x5, 0xcdd, 0x20, 0xffffffffffffffff, 0xd, '\x00', 0x0, 0xffffffffffffffff, 0x5, 0x3, 0x2, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="180000000000000000000000000000001860000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b703000000000023850000000c000000b7000000000000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000001800"/112], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1806000000000000000000000000000218110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000080000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETOFFLOAD(r0, 0xc004743e, 0x20001400) ioctl$TUNSETOFFLOAD(r0, 0x40047459, 0x2000000c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='percpu_alloc_percpu\x00'}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8, 0x81, 0xffffffffffffffff, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) syz_clone(0x200000, &(0x7f00000004c0)="24f49926cbdca3f1de3b422a2a55a0345ce7ad5a1c1e6aa71ddf9fba652608254ff0d862f88bc71ae447ead74bae899bd6e321953caa25ef69fcea5f7adee270bf5e9134402dbe26d1156cedfa8be29bc3d7626eacbda69c7a7bc1f0e7687f9f01c5c0dce87a818cc91414e28a31b2d394c199a2d94fb402a7773b565e9489e560793a", 0x83, &(0x7f00000002c0), &(0x7f00000005c0), &(0x7f0000000600)="197c0b0fff5d35bd9547e46b869dd332") bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r1}, &(0x7f0000000000), &(0x7f0000000040)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018120000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r5 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r6 = openat$cgroup_freezer_state(r5, &(0x7f0000002b00), 0x2, 0x0) close(r6) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000002000000000000000100008400000000000000000300000000000000000000000000000d000000000000000300000006000000000000"], 0x0, 0x4a}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18010000120000010000000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) kernel console output (not intermixed with test programs): : 0000000000000246 R12: 0000000000000001 [ 327.888279][ T9722] R13: 0000000000000000 R14: 00007f49ff48df80 R15: 00007ffdf5a3c118 [ 327.896094][ T9722] [ 328.014671][ T9745] FAULT_INJECTION: forcing a failure. [ 328.014671][ T9745] name failslab, interval 1, probability 0, space 0, times 0 [ 328.212630][ T9745] CPU: 0 PID: 9745 Comm: syz.4.3270 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 328.223751][ T9745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 328.233644][ T9745] Call Trace: [ 328.236767][ T9745] [ 328.239650][ T9745] dump_stack_lvl+0x151/0x1c0 [ 328.244155][ T9745] ? io_uring_drop_tctx_refs+0x190/0x190 [ 328.249619][ T9745] ? selinux_capable+0x2f1/0x430 [ 328.254397][ T9745] dump_stack+0x15/0x20 [ 328.258389][ T9745] should_fail+0x3c6/0x510 [ 328.262640][ T9745] __should_failslab+0xa4/0xe0 [ 328.267238][ T9745] should_failslab+0x9/0x20 [ 328.271592][ T9745] slab_pre_alloc_hook+0x37/0xd0 [ 328.276352][ T9745] __kmalloc+0x6d/0x270 [ 328.280345][ T9745] ? bpf_map_area_alloc+0x4c/0xf0 [ 328.285205][ T9745] bpf_map_area_alloc+0x4c/0xf0 [ 328.289897][ T9745] array_map_alloc+0x278/0x6d0 [ 328.294494][ T9745] map_create+0x411/0x2050 [ 328.298749][ T9745] __sys_bpf+0x296/0x760 [ 328.302826][ T9745] ? fput_many+0x160/0x1b0 [ 328.307078][ T9745] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 328.312289][ T9745] ? debug_smp_processor_id+0x17/0x20 [ 328.312485][ T9753] ¯Ê®¸}p: renamed from pim6reg1 [ 328.317492][ T9745] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 328.317524][ T9745] __x64_sys_bpf+0x7c/0x90 [ 328.332403][ T9745] x64_sys_call+0x87f/0x9a0 [ 328.336674][ T9745] do_syscall_64+0x3b/0xb0 [ 328.340924][ T9745] ? clear_bhb_loop+0x35/0x90 [ 328.345439][ T9745] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 328.351182][ T9745] RIP: 0033:0x7f9ea3555ef9 [ 328.355418][ T9745] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 328.374860][ T9745] RSP: 002b:00007f9ea21d0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 328.383105][ T9745] RAX: ffffffffffffffda RBX: 00007f9ea370ef80 RCX: 00007f9ea3555ef9 [ 328.390917][ T9745] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 2000000000000000 [ 328.398723][ T9745] RBP: 00007f9ea21d0090 R08: 0000000000000000 R09: 0000000000000000 [ 328.406533][ T9745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 328.414345][ T9745] R13: 0000000000000000 R14: 00007f9ea370ef80 R15: 00007fff2a51b0a8 [ 328.422163][ T9745] [ 328.426220][ T9754] device pim6reg1 entered promiscuous mode [ 328.469978][ T9757] device pim6reg1 entered promiscuous mode [ 328.762943][ T9771] FAULT_INJECTION: forcing a failure. [ 328.762943][ T9771] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 328.804838][ T9771] CPU: 1 PID: 9771 Comm: syz.1.3281 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 328.816392][ T9771] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 328.826294][ T9771] Call Trace: [ 328.829405][ T9771] [ 328.832192][ T9771] dump_stack_lvl+0x151/0x1c0 [ 328.836696][ T9771] ? io_uring_drop_tctx_refs+0x190/0x190 [ 328.842170][ T9771] dump_stack+0x15/0x20 [ 328.846158][ T9771] should_fail+0x3c6/0x510 [ 328.850415][ T9771] should_fail_usercopy+0x1a/0x20 [ 328.855271][ T9771] _copy_from_user+0x20/0xd0 [ 328.859796][ T9771] __sys_bpf+0x1e9/0x760 [ 328.863861][ T9771] ? fput_many+0x160/0x1b0 [ 328.868115][ T9771] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 328.873329][ T9771] ? debug_smp_processor_id+0x17/0x20 [ 328.878529][ T9771] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 328.884433][ T9771] __x64_sys_bpf+0x7c/0x90 [ 328.888686][ T9771] x64_sys_call+0x87f/0x9a0 [ 328.893024][ T9771] do_syscall_64+0x3b/0xb0 [ 328.897285][ T9771] ? clear_bhb_loop+0x35/0x90 [ 328.901791][ T9771] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 328.907526][ T9771] RIP: 0033:0x7f6e33cf3ef9 [ 328.911772][ T9771] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 328.931217][ T9771] RSP: 002b:00007f6e3296e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 328.939459][ T9771] RAX: ffffffffffffffda RBX: 00007f6e33eacf80 RCX: 00007f6e33cf3ef9 [ 328.947271][ T9771] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 2000000000000000 [ 328.955078][ T9771] RBP: 00007f6e3296e090 R08: 0000000000000000 R09: 0000000000000000 [ 328.962890][ T9771] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 328.970707][ T9771] R13: 0000000000000000 R14: 00007f6e33eacf80 R15: 00007fff7583b518 [ 328.978520][ T9771] [ 329.039806][ T9795] device pim6reg1 entered promiscuous mode [ 329.056257][ T9790] device pim6reg1 entered promiscuous mode [ 329.207116][ T9799] ¯Ê®¸}p: renamed from pim6reg1 [ 329.368563][ T9833] device pim6reg1 entered promiscuous mode [ 329.374652][ T9833] FAULT_INJECTION: forcing a failure. [ 329.374652][ T9833] name failslab, interval 1, probability 0, space 0, times 0 [ 329.388982][ T9833] CPU: 0 PID: 9833 Comm: syz.4.3305 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 329.400094][ T9833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 329.409987][ T9833] Call Trace: [ 329.413110][ T9833] [ 329.415888][ T9833] dump_stack_lvl+0x151/0x1c0 [ 329.420401][ T9833] ? io_uring_drop_tctx_refs+0x190/0x190 [ 329.425879][ T9833] dump_stack+0x15/0x20 [ 329.429864][ T9833] should_fail+0x3c6/0x510 [ 329.434117][ T9833] __should_failslab+0xa4/0xe0 [ 329.438718][ T9833] should_failslab+0x9/0x20 [ 329.443056][ T9833] slab_pre_alloc_hook+0x37/0xd0 [ 329.447830][ T9833] kmem_cache_alloc_trace+0x48/0x210 [ 329.452946][ T9833] ? ____ip_mc_inc_group+0x215/0x8d0 [ 329.458067][ T9833] ____ip_mc_inc_group+0x215/0x8d0 [ 329.463018][ T9833] ? kfree_skbmem+0x104/0x170 [ 329.467527][ T9833] ? __ip_mc_inc_group+0x30/0x30 [ 329.472304][ T9833] ? __kasan_check_write+0x14/0x20 [ 329.477248][ T9833] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 329.482553][ T9833] ? __kasan_check_read+0x11/0x20 [ 329.487412][ T9833] ip_mc_up+0x10f/0x1e0 [ 329.491395][ T9833] inetdev_event+0xc45/0x10a0 [ 329.495911][ T9833] ? ipv4_doint_and_flush+0x150/0x150 [ 329.501117][ T9833] ? up_read+0x5d/0x220 [ 329.505111][ T9833] raw_notifier_call_chain+0x8c/0xf0 [ 329.510230][ T9833] __dev_notify_flags+0x304/0x610 [ 329.515091][ T9833] ? __dev_change_flags+0x6e0/0x6e0 [ 329.520125][ T9833] ? __dev_change_flags+0x569/0x6e0 [ 329.525160][ T9833] ? avc_denied+0x1b0/0x1b0 [ 329.529509][ T9833] ? dev_get_flags+0x1e0/0x1e0 [ 329.534186][ T9833] ? _kstrtoull+0x3a0/0x4a0 [ 329.538524][ T9833] dev_change_flags+0xf0/0x1a0 [ 329.543135][ T9833] dev_ifsioc+0x147/0x10c0 [ 329.547376][ T9833] ? dev_ioctl+0xe70/0xe70 [ 329.551628][ T9833] ? mutex_lock+0xb6/0x1e0 [ 329.555890][ T9833] ? wait_for_completion_killable_timeout+0x10/0x10 [ 329.562305][ T9833] dev_ioctl+0x54d/0xe70 [ 329.566384][ T9833] sock_do_ioctl+0x34f/0x5a0 [ 329.570812][ T9833] ? sock_show_fdinfo+0xa0/0xa0 [ 329.575498][ T9833] ? selinux_file_ioctl+0x3cc/0x540 [ 329.580529][ T9833] sock_ioctl+0x455/0x740 [ 329.584698][ T9833] ? sock_poll+0x400/0x400 [ 329.588947][ T9833] ? __fget_files+0x31e/0x380 [ 329.593462][ T9833] ? security_file_ioctl+0x84/0xb0 [ 329.598407][ T9833] ? sock_poll+0x400/0x400 [ 329.602662][ T9833] __se_sys_ioctl+0x114/0x190 [ 329.607174][ T9833] __x64_sys_ioctl+0x7b/0x90 [ 329.611600][ T9833] x64_sys_call+0x98/0x9a0 [ 329.615852][ T9833] do_syscall_64+0x3b/0xb0 [ 329.620105][ T9833] ? clear_bhb_loop+0x35/0x90 [ 329.624619][ T9833] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 329.630435][ T9833] RIP: 0033:0x7f9ea3555ef9 [ 329.634689][ T9833] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 329.654307][ T9833] RSP: 002b:00007f9ea21d0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 329.662912][ T9833] RAX: ffffffffffffffda RBX: 00007f9ea370ef80 RCX: 00007f9ea3555ef9 [ 329.670715][ T9833] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000007 [ 329.678529][ T9833] RBP: 00007f9ea21d0090 R08: 0000000000000000 R09: 0000000000000000 [ 329.686340][ T9833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 329.694145][ T9833] R13: 0000000000000000 R14: 00007f9ea370ef80 R15: 00007fff2a51b0a8 [ 329.701972][ T9833] [ 329.746179][ T9837] device pim6reg1 entered promiscuous mode [ 329.762708][ T9841] device pim6reg1 entered promiscuous mode [ 329.826143][ T9853] FAULT_INJECTION: forcing a failure. [ 329.826143][ T9853] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 329.852745][ T9853] CPU: 1 PID: 9853 Comm: syz.4.3313 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 329.864298][ T9853] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 329.874193][ T9853] Call Trace: [ 329.877315][ T9853] [ 329.880091][ T9853] dump_stack_lvl+0x151/0x1c0 [ 329.884604][ T9853] ? io_uring_drop_tctx_refs+0x190/0x190 [ 329.890078][ T9853] dump_stack+0x15/0x20 [ 329.894069][ T9853] should_fail+0x3c6/0x510 [ 329.898322][ T9853] should_fail_usercopy+0x1a/0x20 [ 329.903177][ T9853] _copy_to_user+0x20/0x90 [ 329.907433][ T9853] simple_read_from_buffer+0xc7/0x150 [ 329.912641][ T9853] proc_fail_nth_read+0x1a3/0x210 [ 329.917499][ T9853] ? proc_fault_inject_write+0x390/0x390 [ 329.922965][ T9853] ? fsnotify_perm+0x470/0x5d0 [ 329.927566][ T9853] ? security_file_permission+0x86/0xb0 [ 329.932947][ T9853] ? proc_fault_inject_write+0x390/0x390 [ 329.938414][ T9853] vfs_read+0x27d/0xd40 [ 329.942408][ T9853] ? kernel_read+0x1f0/0x1f0 [ 329.946840][ T9853] ? __kasan_check_write+0x14/0x20 [ 329.951786][ T9853] ? mutex_lock+0xb6/0x1e0 [ 329.956036][ T9853] ? wait_for_completion_killable_timeout+0x10/0x10 [ 329.962463][ T9853] ? __fdget_pos+0x2e7/0x3a0 [ 329.967094][ T9853] ? ksys_read+0x77/0x2c0 [ 329.971516][ T9853] ksys_read+0x199/0x2c0 [ 329.975617][ T9853] ? vfs_write+0x1110/0x1110 [ 329.980110][ T9853] ? debug_smp_processor_id+0x17/0x20 [ 329.985323][ T9853] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 329.991218][ T9853] __x64_sys_read+0x7b/0x90 [ 329.995559][ T9853] x64_sys_call+0x28/0x9a0 [ 329.999897][ T9853] do_syscall_64+0x3b/0xb0 [ 330.004149][ T9853] ? clear_bhb_loop+0x35/0x90 [ 330.008671][ T9853] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 330.014391][ T9853] RIP: 0033:0x7f9ea355493c [ 330.018643][ T9853] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 330.038084][ T9853] RSP: 002b:00007f9ea21d0030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 330.046331][ T9853] RAX: ffffffffffffffda RBX: 00007f9ea370ef80 RCX: 00007f9ea355493c [ 330.054143][ T9853] RDX: 000000000000000f RSI: 00007f9ea21d00a0 RDI: 0000000000000006 [ 330.062037][ T9853] RBP: 00007f9ea21d0090 R08: 0000000000000000 R09: 0000000000000000 [ 330.069851][ T9853] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 330.077669][ T9853] R13: 0000000000000000 R14: 00007f9ea370ef80 R15: 00007fff2a51b0a8 [ 330.085478][ T9853] [ 330.307134][ T9885] FAULT_INJECTION: forcing a failure. [ 330.307134][ T9885] name failslab, interval 1, probability 0, space 0, times 0 [ 330.319773][ T9885] CPU: 0 PID: 9885 Comm: syz.4.3325 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 330.330866][ T9885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 330.340789][ T9885] Call Trace: [ 330.343884][ T9885] [ 330.346668][ T9885] dump_stack_lvl+0x151/0x1c0 [ 330.351182][ T9885] ? io_uring_drop_tctx_refs+0x190/0x190 [ 330.356643][ T9885] ? selinux_capable+0x2f1/0x430 [ 330.361422][ T9885] dump_stack+0x15/0x20 [ 330.365409][ T9885] should_fail+0x3c6/0x510 [ 330.369664][ T9885] __should_failslab+0xa4/0xe0 [ 330.374352][ T9885] should_failslab+0x9/0x20 [ 330.378684][ T9885] slab_pre_alloc_hook+0x37/0xd0 [ 330.383457][ T9885] __kmalloc+0x6d/0x270 [ 330.387449][ T9885] ? bpf_map_area_alloc+0x4c/0xf0 [ 330.392310][ T9885] bpf_map_area_alloc+0x4c/0xf0 [ 330.396998][ T9885] array_map_alloc+0x278/0x6d0 [ 330.401601][ T9885] map_create+0x411/0x2050 [ 330.405851][ T9885] __sys_bpf+0x296/0x760 [ 330.409926][ T9885] ? fput_many+0x160/0x1b0 [ 330.414187][ T9885] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 330.419390][ T9885] ? debug_smp_processor_id+0x17/0x20 [ 330.424596][ T9885] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 330.430498][ T9885] __x64_sys_bpf+0x7c/0x90 [ 330.434837][ T9885] x64_sys_call+0x87f/0x9a0 [ 330.439176][ T9885] do_syscall_64+0x3b/0xb0 [ 330.443429][ T9885] ? clear_bhb_loop+0x35/0x90 [ 330.447942][ T9885] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 330.453672][ T9885] RIP: 0033:0x7f9ea3555ef9 [ 330.457924][ T9885] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 330.477378][ T9885] RSP: 002b:00007f9ea21d0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 330.485698][ T9885] RAX: ffffffffffffffda RBX: 00007f9ea370ef80 RCX: 00007f9ea3555ef9 [ 330.493942][ T9885] RDX: 0000000000000048 RSI: 0000000020000140 RDI: 2000000000000000 [ 330.501752][ T9885] RBP: 00007f9ea21d0090 R08: 0000000000000000 R09: 0000000000000000 [ 330.509562][ T9885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 330.517375][ T9885] R13: 0000000000000000 R14: 00007f9ea370ef80 R15: 00007fff2a51b0a8 [ 330.525189][ T9885] [ 330.528202][ T9861] ¯Ê®¸}p: renamed from pim6reg1 [ 330.596776][ T9893] device pim6reg1 entered promiscuous mode [ 330.604198][ T9891] device pim6reg1 entered promiscuous mode [ 331.226700][ T9928] ¯Ê®¸}p: renamed from pim6reg1 [ 331.262830][ T9936] device pim6reg1 entered promiscuous mode [ 331.273471][ T9938] device pim6reg1 entered promiscuous mode [ 331.318017][ T9941] device pim6reg1 entered promiscuous mode [ 331.324636][ T9941] FAULT_INJECTION: forcing a failure. [ 331.324636][ T9941] name failslab, interval 1, probability 0, space 0, times 0 [ 331.338039][ T9941] CPU: 1 PID: 9941 Comm: syz.4.3347 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 331.349147][ T9941] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 331.359053][ T9941] Call Trace: [ 331.362164][ T9941] [ 331.364946][ T9941] dump_stack_lvl+0x151/0x1c0 [ 331.369453][ T9941] ? io_uring_drop_tctx_refs+0x190/0x190 [ 331.374926][ T9941] dump_stack+0x15/0x20 [ 331.378914][ T9941] should_fail+0x3c6/0x510 [ 331.383171][ T9941] __should_failslab+0xa4/0xe0 [ 331.387768][ T9941] should_failslab+0x9/0x20 [ 331.392110][ T9941] slab_pre_alloc_hook+0x37/0xd0 [ 331.396881][ T9941] __kmalloc+0x6d/0x270 [ 331.400871][ T9941] ? fib6_info_alloc+0x33/0xe0 [ 331.405483][ T9941] fib6_info_alloc+0x33/0xe0 [ 331.409903][ T9941] ip6_route_info_create+0x50b/0x14c0 [ 331.415105][ T9941] ? __mutex_lock_slowpath+0x10/0x10 [ 331.420243][ T9941] ip6_route_add+0x27/0x130 [ 331.424574][ T9941] addrconf_add_dev+0x415/0x610 [ 331.429254][ T9941] ? ____kasan_kmalloc+0xdb/0x110 [ 331.434112][ T9941] ? __kasan_kmalloc+0x9/0x10 [ 331.438629][ T9941] ? local_bh_enable+0x30/0x30 [ 331.443226][ T9941] ? __dev_notify_flags+0x304/0x610 [ 331.448274][ T9941] ? __kasan_check_read+0x11/0x20 [ 331.453132][ T9941] addrconf_init_auto_addrs+0xad0/0x1060 [ 331.458591][ T9941] ? addrconf_dad_run+0x610/0x610 [ 331.463449][ T9941] ? __local_bh_enable_ip+0x58/0x80 [ 331.468482][ T9941] ? _raw_write_unlock_bh+0x32/0x48 [ 331.473514][ T9941] ? addrconf_permanent_addr+0xb40/0xba0 [ 331.479103][ T9941] ? __kasan_check_write+0x14/0x20 [ 331.484049][ T9941] ? addrconf_notify+0xdd0/0xdd0 [ 331.488825][ T9941] ? igmpv3_del_delrec+0x740/0x740 [ 331.493781][ T9941] ? __local_bh_enable_ip+0x58/0x80 [ 331.498806][ T9941] ? __kasan_check_write+0x14/0x20 [ 331.503753][ T9941] ? mutex_unlock+0xb2/0x260 [ 331.508176][ T9941] ? tun_device_event+0x3ef/0xf80 [ 331.513036][ T9941] ? __mutex_lock_slowpath+0x10/0x10 [ 331.518155][ T9941] ? macsec_notify+0x101/0x4c0 [ 331.522758][ T9941] ? addrconf_link_ready+0xfb/0x1e0 [ 331.528051][ T9941] addrconf_notify+0x91d/0xdd0 [ 331.532652][ T9941] raw_notifier_call_chain+0x8c/0xf0 [ 331.537774][ T9941] __dev_notify_flags+0x304/0x610 [ 331.542634][ T9941] ? __dev_change_flags+0x6e0/0x6e0 [ 331.547667][ T9941] ? __dev_change_flags+0x569/0x6e0 [ 331.552700][ T9941] ? avc_denied+0x1b0/0x1b0 [ 331.557042][ T9941] ? dev_get_flags+0x1e0/0x1e0 [ 331.561640][ T9941] ? _kstrtoull+0x3a0/0x4a0 [ 331.565981][ T9941] dev_change_flags+0xf0/0x1a0 [ 331.570580][ T9941] dev_ifsioc+0x147/0x10c0 [ 331.574833][ T9941] ? dev_ioctl+0xe70/0xe70 [ 331.579085][ T9941] ? mutex_lock+0xb6/0x1e0 [ 331.583345][ T9941] ? wait_for_completion_killable_timeout+0x10/0x10 [ 331.589764][ T9941] dev_ioctl+0x54d/0xe70 [ 331.593840][ T9941] sock_do_ioctl+0x34f/0x5a0 [ 331.598267][ T9941] ? sock_show_fdinfo+0xa0/0xa0 [ 331.602962][ T9941] ? selinux_file_ioctl+0x3cc/0x540 [ 331.607986][ T9941] sock_ioctl+0x455/0x740 [ 331.612153][ T9941] ? sock_poll+0x400/0x400 [ 331.616403][ T9941] ? __fget_files+0x31e/0x380 [ 331.620923][ T9941] ? security_file_ioctl+0x84/0xb0 [ 331.625866][ T9941] ? sock_poll+0x400/0x400 [ 331.630118][ T9941] __se_sys_ioctl+0x114/0x190 [ 331.634633][ T9941] __x64_sys_ioctl+0x7b/0x90 [ 331.639058][ T9941] x64_sys_call+0x98/0x9a0 [ 331.643659][ T9941] do_syscall_64+0x3b/0xb0 [ 331.647909][ T9941] ? clear_bhb_loop+0x35/0x90 [ 331.652426][ T9941] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 331.658151][ T9941] RIP: 0033:0x7f9ea3555ef9 [ 331.662406][ T9941] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 331.681845][ T9941] RSP: 002b:00007f9ea21d0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 331.690096][ T9941] RAX: ffffffffffffffda RBX: 00007f9ea370ef80 RCX: 00007f9ea3555ef9 [ 331.697901][ T9941] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000007 [ 331.705715][ T9941] RBP: 00007f9ea21d0090 R08: 0000000000000000 R09: 0000000000000000 [ 331.713528][ T9941] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 331.721334][ T9941] R13: 0000000000000000 R14: 00007f9ea370ef80 R15: 00007fff2a51b0a8 [ 331.729150][ T9941] [ 332.078869][ T9972] FAULT_INJECTION: forcing a failure. [ 332.078869][ T9972] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 332.100106][ T9972] CPU: 0 PID: 9972 Comm: syz.2.3361 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 332.111224][ T9972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 332.121379][ T9972] Call Trace: [ 332.124505][ T9972] [ 332.127282][ T9972] dump_stack_lvl+0x151/0x1c0 [ 332.131797][ T9972] ? io_uring_drop_tctx_refs+0x190/0x190 [ 332.137262][ T9972] dump_stack+0x15/0x20 [ 332.141252][ T9972] should_fail+0x3c6/0x510 [ 332.145509][ T9972] should_fail_usercopy+0x1a/0x20 [ 332.150363][ T9972] _copy_to_user+0x20/0x90 [ 332.154618][ T9972] simple_read_from_buffer+0xc7/0x150 [ 332.159826][ T9972] proc_fail_nth_read+0x1a3/0x210 [ 332.164686][ T9972] ? proc_fault_inject_write+0x390/0x390 [ 332.170243][ T9972] ? fsnotify_perm+0x470/0x5d0 [ 332.174846][ T9972] ? security_file_permission+0x86/0xb0 [ 332.180306][ T9972] ? proc_fault_inject_write+0x390/0x390 [ 332.185789][ T9972] vfs_read+0x27d/0xd40 [ 332.189766][ T9972] ? kernel_read+0x1f0/0x1f0 [ 332.194196][ T9972] ? __kasan_check_write+0x14/0x20 [ 332.199137][ T9972] ? mutex_lock+0xb6/0x1e0 [ 332.203393][ T9972] ? wait_for_completion_killable_timeout+0x10/0x10 [ 332.209813][ T9972] ? __fdget_pos+0x2e7/0x3a0 [ 332.214240][ T9972] ? ksys_read+0x77/0x2c0 [ 332.218404][ T9972] ksys_read+0x199/0x2c0 [ 332.222485][ T9972] ? vfs_write+0x1110/0x1110 [ 332.226912][ T9972] ? debug_smp_processor_id+0x17/0x20 [ 332.232117][ T9972] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 332.238020][ T9972] __x64_sys_read+0x7b/0x90 [ 332.242360][ T9972] x64_sys_call+0x28/0x9a0 [ 332.246613][ T9972] do_syscall_64+0x3b/0xb0 [ 332.250866][ T9972] ? clear_bhb_loop+0x35/0x90 [ 332.255381][ T9972] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 332.261106][ T9972] RIP: 0033:0x7f1b52dc693c [ 332.265361][ T9972] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 332.284804][ T9972] RSP: 002b:00007f1b51a42030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 332.293045][ T9972] RAX: ffffffffffffffda RBX: 00007f1b52f80f80 RCX: 00007f1b52dc693c [ 332.300862][ T9972] RDX: 000000000000000f RSI: 00007f1b51a420a0 RDI: 0000000000000006 [ 332.308680][ T9972] RBP: 00007f1b51a42090 R08: 0000000000000000 R09: 0000000000000000 [ 332.316482][ T9972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 332.324297][ T9972] R13: 0000000000000000 R14: 00007f1b52f80f80 R15: 00007ffea5c015b8 [ 332.332113][ T9972] [ 332.384667][ T9973] device pim6reg1 entered promiscuous mode [ 332.415061][ T9975] ¯Ê®¸}p: renamed from pim6reg1 [ 332.422748][ T9979] device pim6reg1 entered promiscuous mode [ 332.662766][T10019] device pim6reg1 entered promiscuous mode [ 332.733921][T10026] device pim6reg1 entered promiscuous mode [ 332.744138][T10024] device pim6reg1 entered promiscuous mode [ 332.789776][T10023] ¯Ê®¸}p: renamed from pim6reg1 [ 332.883870][T10040] device pim6reg1 entered promiscuous mode [ 332.892136][T10040] FAULT_INJECTION: forcing a failure. [ 332.892136][T10040] name failslab, interval 1, probability 0, space 0, times 0 [ 332.904605][T10040] CPU: 0 PID: 10040 Comm: syz.0.3387 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 332.915755][T10040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 332.925650][T10040] Call Trace: [ 332.928769][T10040] [ 332.931546][T10040] dump_stack_lvl+0x151/0x1c0 [ 332.936059][T10040] ? io_uring_drop_tctx_refs+0x190/0x190 [ 332.941527][T10040] ? pcpu_alloc+0xda0/0x13e0 [ 332.945953][T10040] dump_stack+0x15/0x20 [ 332.949945][T10040] should_fail+0x3c6/0x510 [ 332.954198][T10040] __should_failslab+0xa4/0xe0 [ 332.958806][T10040] ? __alloc_skb+0xbe/0x550 [ 332.963137][T10040] should_failslab+0x9/0x20 [ 332.967476][T10040] slab_pre_alloc_hook+0x37/0xd0 [ 332.972250][T10040] ? __alloc_skb+0xbe/0x550 [ 332.976591][T10040] kmem_cache_alloc+0x44/0x200 [ 332.981190][T10040] __alloc_skb+0xbe/0x550 [ 332.985365][T10040] inet6_rt_notify+0x2db/0x550 [ 332.989955][T10040] ? x64_sys_call+0x98/0x9a0 [ 332.994385][T10040] ? rt6_nh_dump_exceptions+0x650/0x650 [ 332.999767][T10040] fib6_add+0x23ac/0x3df0 [ 333.003932][T10040] ? skb_gro_incr_csum_unnecessary+0x260/0x260 [ 333.009917][T10040] ? ipv6_addr_prefix+0x42/0x180 [ 333.014694][T10040] ? fib6_update_sernum_stub+0x1a0/0x1a0 [ 333.020160][T10040] ? __kasan_check_write+0x14/0x20 [ 333.025107][T10040] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 333.029966][T10040] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 333.035002][T10040] ip6_route_add+0x8a/0x130 [ 333.039509][T10040] addrconf_add_dev+0x415/0x610 [ 333.044188][T10040] ? ____kasan_kmalloc+0xdb/0x110 [ 333.049045][T10040] ? __kasan_kmalloc+0x9/0x10 [ 333.053558][T10040] ? local_bh_enable+0x30/0x30 [ 333.058156][T10040] ? __dev_notify_flags+0x304/0x610 [ 333.063196][T10040] ? __kasan_check_read+0x11/0x20 [ 333.068053][T10040] addrconf_init_auto_addrs+0xad0/0x1060 [ 333.073520][T10040] ? addrconf_dad_run+0x610/0x610 [ 333.078382][T10040] ? __local_bh_enable_ip+0x58/0x80 [ 333.083412][T10040] ? _raw_write_unlock_bh+0x32/0x48 [ 333.088447][T10040] ? addrconf_permanent_addr+0xb40/0xba0 [ 333.093917][T10040] ? __kasan_check_write+0x14/0x20 [ 333.098869][T10040] ? addrconf_notify+0xdd0/0xdd0 [ 333.103637][T10040] ? igmpv3_del_delrec+0x740/0x740 [ 333.108582][T10040] ? __local_bh_enable_ip+0x58/0x80 [ 333.113619][T10040] ? __kasan_check_write+0x14/0x20 [ 333.118575][T10040] ? mutex_unlock+0xb2/0x260 [ 333.122989][T10040] ? tun_device_event+0x3ef/0xf80 [ 333.127853][T10040] ? __mutex_lock_slowpath+0x10/0x10 [ 333.132973][T10040] ? macsec_notify+0x101/0x4c0 [ 333.137572][T10040] ? addrconf_link_ready+0xfb/0x1e0 [ 333.142606][T10040] addrconf_notify+0x91d/0xdd0 [ 333.147207][T10040] raw_notifier_call_chain+0x8c/0xf0 [ 333.152327][T10040] __dev_notify_flags+0x304/0x610 [ 333.157185][T10040] ? __dev_change_flags+0x6e0/0x6e0 [ 333.162221][T10040] ? __dev_change_flags+0x569/0x6e0 [ 333.167262][T10040] ? avc_denied+0x1b0/0x1b0 [ 333.171593][T10040] ? dev_get_flags+0x1e0/0x1e0 [ 333.176192][T10040] ? _kstrtoull+0x3a0/0x4a0 [ 333.180536][T10040] dev_change_flags+0xf0/0x1a0 [ 333.185135][T10040] dev_ifsioc+0x147/0x10c0 [ 333.189387][T10040] ? dev_ioctl+0xe70/0xe70 [ 333.193642][T10040] ? mutex_lock+0xb6/0x1e0 [ 333.197898][T10040] ? wait_for_completion_killable_timeout+0x10/0x10 [ 333.204424][T10040] dev_ioctl+0x54d/0xe70 [ 333.208502][T10040] sock_do_ioctl+0x34f/0x5a0 [ 333.212927][T10040] ? sock_show_fdinfo+0xa0/0xa0 [ 333.217629][T10040] ? selinux_file_ioctl+0x3cc/0x540 [ 333.222648][T10040] sock_ioctl+0x455/0x740 [ 333.226812][T10040] ? sock_poll+0x400/0x400 [ 333.231066][T10040] ? __fget_files+0x31e/0x380 [ 333.235581][T10040] ? security_file_ioctl+0x84/0xb0 [ 333.240529][T10040] ? sock_poll+0x400/0x400 [ 333.244781][T10040] __se_sys_ioctl+0x114/0x190 [ 333.249292][T10040] __x64_sys_ioctl+0x7b/0x90 [ 333.253719][T10040] x64_sys_call+0x98/0x9a0 [ 333.257975][T10040] do_syscall_64+0x3b/0xb0 [ 333.262238][T10040] ? clear_bhb_loop+0x35/0x90 [ 333.266746][T10040] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 333.272551][T10040] RIP: 0033:0x7f49ff2d4ef9 [ 333.276807][T10040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 333.296253][T10040] RSP: 002b:00007f49fdf4f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 333.304490][T10040] RAX: ffffffffffffffda RBX: 00007f49ff48df80 RCX: 00007f49ff2d4ef9 [ 333.312303][T10040] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000007 [ 333.320122][T10040] RBP: 00007f49fdf4f090 R08: 0000000000000000 R09: 0000000000000000 [ 333.327924][T10040] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 333.335735][T10040] R13: 0000000000000000 R14: 00007f49ff48df80 R15: 00007ffdf5a3c118 [ 333.343582][T10040] [ 334.056891][T10062] device pim6reg1 entered promiscuous mode [ 334.083373][T10069] device pim6reg1 entered promiscuous mode [ 334.582570][T10093] ¯Ê®¸}p: renamed from pim6reg1 [ 334.693858][T10107] device pim6reg1 entered promiscuous mode [ 334.729790][T10109] device pim6reg1 entered promiscuous mode [ 334.764727][T10114] device pim6reg1 entered promiscuous mode [ 334.819431][T10120] device vxcan1 entered promiscuous mode [ 334.988600][T10134] ¯Ê®¸}p: renamed from pim6reg1 [ 335.016942][T10138] device pim6reg1 entered promiscuous mode [ 335.074212][T10142] device pim6reg1 entered promiscuous mode [ 335.080296][T10142] FAULT_INJECTION: forcing a failure. [ 335.080296][T10142] name failslab, interval 1, probability 0, space 0, times 0 [ 335.102194][T10142] CPU: 1 PID: 10142 Comm: syz.1.3428 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 335.113397][T10142] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 335.123292][T10142] Call Trace: [ 335.126413][T10142] [ 335.129189][T10142] dump_stack_lvl+0x151/0x1c0 [ 335.133703][T10142] ? io_uring_drop_tctx_refs+0x190/0x190 [ 335.139167][T10142] ? release_firmware_map_entry+0x190/0x190 [ 335.144899][T10142] dump_stack+0x15/0x20 [ 335.148887][T10142] should_fail+0x3c6/0x510 [ 335.153143][T10142] __should_failslab+0xa4/0xe0 [ 335.157742][T10142] should_failslab+0x9/0x20 [ 335.162169][T10142] slab_pre_alloc_hook+0x37/0xd0 [ 335.166942][T10142] __kmalloc+0x6d/0x270 [ 335.170932][T10142] ? fib6_info_alloc+0x33/0xe0 [ 335.175533][T10142] fib6_info_alloc+0x33/0xe0 [ 335.179961][T10142] ip6_route_info_create+0x50b/0x14c0 [ 335.185173][T10142] ? __mutex_lock_slowpath+0x10/0x10 [ 335.190288][T10142] ip6_route_add+0x27/0x130 [ 335.194630][T10142] addrconf_add_dev+0x415/0x610 [ 335.199326][T10142] ? ____kasan_kmalloc+0xdb/0x110 [ 335.204174][T10142] ? __kasan_kmalloc+0x9/0x10 [ 335.208688][T10142] ? local_bh_enable+0x30/0x30 [ 335.213292][T10142] ? __dev_notify_flags+0x304/0x610 [ 335.218333][T10142] ? __kasan_check_read+0x11/0x20 [ 335.223182][T10142] addrconf_init_auto_addrs+0xad0/0x1060 [ 335.228649][T10142] ? addrconf_dad_run+0x610/0x610 [ 335.233510][T10142] ? __local_bh_enable_ip+0x58/0x80 [ 335.238542][T10142] ? _raw_write_unlock_bh+0x32/0x48 [ 335.243577][T10142] ? addrconf_permanent_addr+0xb40/0xba0 [ 335.249044][T10142] ? __kasan_check_write+0x14/0x20 [ 335.253991][T10142] ? addrconf_notify+0xdd0/0xdd0 [ 335.258763][T10142] ? igmpv3_del_delrec+0x740/0x740 [ 335.263713][T10142] ? __local_bh_enable_ip+0x58/0x80 [ 335.268835][T10142] ? __kasan_check_write+0x14/0x20 [ 335.273780][T10142] ? mutex_unlock+0xb2/0x260 [ 335.278218][T10142] ? tun_device_event+0x3ef/0xf80 [ 335.283069][T10142] ? __mutex_lock_slowpath+0x10/0x10 [ 335.288199][T10142] ? macsec_notify+0x101/0x4c0 [ 335.292793][T10142] ? addrconf_link_ready+0xfb/0x1e0 [ 335.297823][T10142] addrconf_notify+0x91d/0xdd0 [ 335.302424][T10142] raw_notifier_call_chain+0x8c/0xf0 [ 335.307542][T10142] __dev_notify_flags+0x304/0x610 [ 335.312403][T10142] ? __dev_change_flags+0x6e0/0x6e0 [ 335.317447][T10142] ? __dev_change_flags+0x569/0x6e0 [ 335.322469][T10142] ? avc_denied+0x1b0/0x1b0 [ 335.326821][T10142] ? dev_get_flags+0x1e0/0x1e0 [ 335.331414][T10142] ? _kstrtoull+0x3a0/0x4a0 [ 335.335754][T10142] dev_change_flags+0xf0/0x1a0 [ 335.340364][T10142] dev_ifsioc+0x147/0x10c0 [ 335.344608][T10142] ? dev_ioctl+0xe70/0xe70 [ 335.348853][T10142] ? mutex_lock+0xb6/0x1e0 [ 335.353109][T10142] ? wait_for_completion_killable_timeout+0x10/0x10 [ 335.359532][T10142] dev_ioctl+0x54d/0xe70 [ 335.363611][T10142] sock_do_ioctl+0x34f/0x5a0 [ 335.368036][T10142] ? sock_show_fdinfo+0xa0/0xa0 [ 335.372723][T10142] ? selinux_file_ioctl+0x3cc/0x540 [ 335.377755][T10142] sock_ioctl+0x455/0x740 [ 335.381922][T10142] ? sock_poll+0x400/0x400 [ 335.386269][T10142] ? __fget_files+0x31e/0x380 [ 335.390781][T10142] ? security_file_ioctl+0x84/0xb0 [ 335.395727][T10142] ? sock_poll+0x400/0x400 [ 335.399979][T10142] __se_sys_ioctl+0x114/0x190 [ 335.404492][T10142] __x64_sys_ioctl+0x7b/0x90 [ 335.408918][T10142] x64_sys_call+0x98/0x9a0 [ 335.413259][T10142] do_syscall_64+0x3b/0xb0 [ 335.417517][T10142] ? clear_bhb_loop+0x35/0x90 [ 335.422053][T10142] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 335.427752][T10142] RIP: 0033:0x7f6e33cf3ef9 [ 335.432008][T10142] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 335.451448][T10142] RSP: 002b:00007f6e3296e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 335.459691][T10142] RAX: ffffffffffffffda RBX: 00007f6e33eacf80 RCX: 00007f6e33cf3ef9 [ 335.467503][T10142] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000007 [ 335.475489][T10142] RBP: 00007f6e3296e090 R08: 0000000000000000 R09: 0000000000000000 [ 335.483301][T10142] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 335.491112][T10142] R13: 0000000000000000 R14: 00007f6e33eacf80 R15: 00007fff7583b518 [ 335.498926][T10142] [ 335.518549][T10144] device pim6reg1 entered promiscuous mode [ 335.581085][T10163] device pim6reg1 entered promiscuous mode [ 335.773461][T10185] syz.0.3447[10185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 335.773534][T10185] syz.0.3447[10185] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 336.047077][T10187] ¯Ê®¸}p: renamed from pim6reg1 [ 336.269391][T10198] device pim6reg1 entered promiscuous mode [ 336.336624][T10202] device pim6reg1 entered promiscuous mode [ 336.908878][T10245] device pim6reg1 entered promiscuous mode [ 336.916089][T10231] ¯Ê®¸}p: renamed from pim6reg1 [ 336.926074][T10244] device pim6reg1 entered promiscuous mode [ 336.931873][T10244] FAULT_INJECTION: forcing a failure. [ 336.931873][T10244] name failslab, interval 1, probability 0, space 0, times 0 [ 336.944365][T10244] CPU: 1 PID: 10244 Comm: syz.1.3470 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 336.955475][T10244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 336.965364][T10244] Call Trace: [ 336.968484][T10244] [ 336.971267][T10244] dump_stack_lvl+0x151/0x1c0 [ 336.975779][T10244] ? io_uring_drop_tctx_refs+0x190/0x190 [ 336.981248][T10244] dump_stack+0x15/0x20 [ 336.985237][T10244] should_fail+0x3c6/0x510 [ 336.989497][T10244] __should_failslab+0xa4/0xe0 [ 336.994089][T10244] should_failslab+0x9/0x20 [ 336.998433][T10244] slab_pre_alloc_hook+0x37/0xd0 [ 337.003204][T10244] kmem_cache_alloc_trace+0x48/0x210 [ 337.008321][T10244] ? ____ip_mc_inc_group+0x215/0x8d0 [ 337.013448][T10244] ____ip_mc_inc_group+0x215/0x8d0 [ 337.018391][T10244] ? kfree_skbmem+0x104/0x170 [ 337.022905][T10244] ? __ip_mc_inc_group+0x30/0x30 [ 337.027677][T10244] ? __kasan_check_write+0x14/0x20 [ 337.032628][T10244] ? _raw_spin_lock_irqsave+0xf9/0x210 [ 337.037918][T10244] ? __kasan_check_read+0x11/0x20 [ 337.042785][T10244] ip_mc_up+0x10f/0x1e0 [ 337.046774][T10244] inetdev_event+0xc45/0x10a0 [ 337.051286][T10244] ? ipv4_doint_and_flush+0x150/0x150 [ 337.056491][T10244] ? up_read+0x5d/0x220 [ 337.060484][T10244] raw_notifier_call_chain+0x8c/0xf0 [ 337.065605][T10244] __dev_notify_flags+0x304/0x610 [ 337.070464][T10244] ? __dev_change_flags+0x6e0/0x6e0 [ 337.075503][T10244] ? __dev_change_flags+0x569/0x6e0 [ 337.080538][T10244] ? avc_denied+0x1b0/0x1b0 [ 337.084873][T10244] ? dev_get_flags+0x1e0/0x1e0 [ 337.089473][T10244] dev_change_flags+0xf0/0x1a0 [ 337.094077][T10244] dev_ifsioc+0x147/0x10c0 [ 337.098328][T10244] ? dev_ioctl+0xe70/0xe70 [ 337.102580][T10244] ? mutex_lock+0x135/0x1e0 [ 337.106920][T10244] ? wait_for_completion_killable_timeout+0x10/0x10 [ 337.113345][T10244] dev_ioctl+0x54d/0xe70 [ 337.117421][T10244] sock_do_ioctl+0x34f/0x5a0 [ 337.121844][T10244] ? sock_show_fdinfo+0xa0/0xa0 [ 337.126534][T10244] ? selinux_file_ioctl+0x3cc/0x540 [ 337.131566][T10244] sock_ioctl+0x455/0x740 [ 337.135738][T10244] ? sock_poll+0x400/0x400 [ 337.139992][T10244] ? __fget_files+0x31e/0x380 [ 337.144500][T10244] ? security_file_ioctl+0x84/0xb0 [ 337.149451][T10244] ? sock_poll+0x400/0x400 [ 337.153707][T10244] __se_sys_ioctl+0x114/0x190 [ 337.158213][T10244] __x64_sys_ioctl+0x7b/0x90 [ 337.162636][T10244] x64_sys_call+0x98/0x9a0 [ 337.166890][T10244] do_syscall_64+0x3b/0xb0 [ 337.171142][T10244] ? clear_bhb_loop+0x35/0x90 [ 337.175654][T10244] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 337.181404][T10244] RIP: 0033:0x7f6e33cf3ef9 [ 337.185640][T10244] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 337.205082][T10244] RSP: 002b:00007f6e3296e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 337.213322][T10244] RAX: ffffffffffffffda RBX: 00007f6e33eacf80 RCX: 00007f6e33cf3ef9 [ 337.221133][T10244] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000007 [ 337.228945][T10244] RBP: 00007f6e3296e090 R08: 0000000000000000 R09: 0000000000000000 [ 337.236843][T10244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 337.244654][T10244] R13: 0000000000000000 R14: 00007f6e33eacf80 R15: 00007fff7583b518 [ 337.252473][T10244] [ 337.262231][T10249] device pim6reg1 entered promiscuous mode [ 337.353336][T10263] device pim6reg1 entered promiscuous mode [ 337.662083][T10286] device pim6reg1 entered promiscuous mode [ 337.670166][T10293] device pim6reg1 entered promiscuous mode [ 337.698820][T10290] ¯Ê®¸}p: renamed from pim6reg1 [ 337.752480][T10295] device pim6reg1 entered promiscuous mode [ 338.582183][T10324] device pim6reg1 entered promiscuous mode [ 338.649768][T10332] device pim6reg1 entered promiscuous mode [ 338.658091][T10328] device pim6reg1 entered promiscuous mode [ 338.664051][T10328] FAULT_INJECTION: forcing a failure. [ 338.664051][T10328] name failslab, interval 1, probability 0, space 0, times 0 [ 338.676489][T10328] CPU: 0 PID: 10328 Comm: syz.2.3505 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 338.687649][T10328] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 338.697543][T10328] Call Trace: [ 338.700669][T10328] [ 338.703445][T10328] dump_stack_lvl+0x151/0x1c0 [ 338.707958][T10328] ? io_uring_drop_tctx_refs+0x190/0x190 [ 338.713425][T10328] ? pcpu_alloc+0xda0/0x13e0 [ 338.717852][T10328] dump_stack+0x15/0x20 [ 338.721843][T10328] should_fail+0x3c6/0x510 [ 338.726096][T10328] __should_failslab+0xa4/0xe0 [ 338.730705][T10328] ? __alloc_skb+0xbe/0x550 [ 338.735034][T10328] should_failslab+0x9/0x20 [ 338.739376][T10328] slab_pre_alloc_hook+0x37/0xd0 [ 338.744148][T10328] ? __alloc_skb+0xbe/0x550 [ 338.748487][T10328] kmem_cache_alloc+0x44/0x200 [ 338.753087][T10328] __alloc_skb+0xbe/0x550 [ 338.757257][T10328] inet6_rt_notify+0x2db/0x550 [ 338.761852][T10328] ? x64_sys_call+0x98/0x9a0 [ 338.766281][T10328] ? rt6_nh_dump_exceptions+0x650/0x650 [ 338.771670][T10328] fib6_add+0x23ac/0x3df0 [ 338.775835][T10328] ? skb_gro_incr_csum_unnecessary+0x260/0x260 [ 338.781813][T10328] ? ipv6_addr_prefix+0x42/0x180 [ 338.786594][T10328] ? fib6_update_sernum_stub+0x1a0/0x1a0 [ 338.792057][T10328] ? __kasan_check_write+0x14/0x20 [ 338.797004][T10328] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 338.801884][T10328] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 338.806902][T10328] ip6_route_add+0x8a/0x130 [ 338.811239][T10328] addrconf_add_dev+0x415/0x610 [ 338.815924][T10328] ? ____kasan_kmalloc+0xdb/0x110 [ 338.820797][T10328] ? __kasan_kmalloc+0x9/0x10 [ 338.825299][T10328] ? local_bh_enable+0x30/0x30 [ 338.829984][T10328] ? __dev_notify_flags+0x304/0x610 [ 338.835026][T10328] ? __kasan_check_read+0x11/0x20 [ 338.839878][T10328] addrconf_init_auto_addrs+0xad0/0x1060 [ 338.845348][T10328] ? addrconf_dad_run+0x610/0x610 [ 338.850205][T10328] ? __local_bh_enable_ip+0x58/0x80 [ 338.855328][T10328] ? _raw_write_unlock_bh+0x32/0x48 [ 338.860449][T10328] ? addrconf_permanent_addr+0xb40/0xba0 [ 338.865916][T10328] ? __kasan_check_write+0x14/0x20 [ 338.870864][T10328] ? addrconf_notify+0xdd0/0xdd0 [ 338.875635][T10328] ? igmpv3_del_delrec+0x740/0x740 [ 338.880585][T10328] ? __local_bh_enable_ip+0x58/0x80 [ 338.885616][T10328] ? __kasan_check_write+0x14/0x20 [ 338.890567][T10328] ? mutex_unlock+0xb2/0x260 [ 338.895015][T10328] ? tun_device_event+0x3ef/0xf80 [ 338.899851][T10328] ? __mutex_lock_slowpath+0x10/0x10 [ 338.905058][T10328] ? macsec_notify+0x101/0x4c0 [ 338.909658][T10328] ? addrconf_link_ready+0xfb/0x1e0 [ 338.914692][T10328] addrconf_notify+0x91d/0xdd0 [ 338.919436][T10328] raw_notifier_call_chain+0x8c/0xf0 [ 338.924539][T10328] __dev_notify_flags+0x304/0x610 [ 338.929398][T10328] ? __dev_change_flags+0x6e0/0x6e0 [ 338.934435][T10328] ? __dev_change_flags+0x569/0x6e0 [ 338.939464][T10328] ? avc_denied+0x1b0/0x1b0 [ 338.943805][T10328] ? dev_get_flags+0x1e0/0x1e0 [ 338.948405][T10328] dev_change_flags+0xf0/0x1a0 [ 338.953005][T10328] dev_ifsioc+0x147/0x10c0 [ 338.957259][T10328] ? dev_ioctl+0xe70/0xe70 [ 338.961508][T10328] ? mutex_lock+0x135/0x1e0 [ 338.965847][T10328] ? wait_for_completion_killable_timeout+0x10/0x10 [ 338.972272][T10328] dev_ioctl+0x54d/0xe70 [ 338.976488][T10328] sock_do_ioctl+0x34f/0x5a0 [ 338.980981][T10328] ? sock_show_fdinfo+0xa0/0xa0 [ 338.985664][T10328] ? selinux_file_ioctl+0x3cc/0x540 [ 338.990694][T10328] sock_ioctl+0x455/0x740 [ 338.994869][T10328] ? sock_poll+0x400/0x400 [ 338.999118][T10328] ? __fget_files+0x31e/0x380 [ 339.003627][T10328] ? security_file_ioctl+0x84/0xb0 [ 339.008573][T10328] ? sock_poll+0x400/0x400 [ 339.012824][T10328] __se_sys_ioctl+0x114/0x190 [ 339.017343][T10328] __x64_sys_ioctl+0x7b/0x90 [ 339.021774][T10328] x64_sys_call+0x98/0x9a0 [ 339.026016][T10328] do_syscall_64+0x3b/0xb0 [ 339.030268][T10328] ? clear_bhb_loop+0x35/0x90 [ 339.034784][T10328] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 339.040511][T10328] RIP: 0033:0x7f1b52dc7ef9 [ 339.044763][T10328] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 339.064205][T10328] RSP: 002b:00007f1b51a42038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 339.072451][T10328] RAX: ffffffffffffffda RBX: 00007f1b52f80f80 RCX: 00007f1b52dc7ef9 [ 339.080260][T10328] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000007 [ 339.088075][T10328] RBP: 00007f1b51a42090 R08: 0000000000000000 R09: 0000000000000000 [ 339.095890][T10328] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 339.103706][T10328] R13: 0000000000000000 R14: 00007f1b52f80f80 R15: 00007ffea5c015b8 [ 339.111512][T10328] [ 339.269276][T10339] ¯Ê®¸}p: renamed from pim6reg1 [ 339.293278][T10357] device pim6reg1 entered promiscuous mode [ 339.774762][T10381] syz.1.3526[10381] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.774838][T10381] syz.1.3526[10381] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 339.864380][T10380] device pim6reg1 entered promiscuous mode [ 340.273692][T10394] ¯Ê®¸}p: renamed from pim6reg1 [ 340.289683][T10407] device pim6reg1 entered promiscuous mode [ 340.321346][T10414] device syzkaller0 entered promiscuous mode [ 340.357829][T10420] device pim6reg1 entered promiscuous mode [ 340.367348][T10420] FAULT_INJECTION: forcing a failure. [ 340.367348][T10420] name failslab, interval 1, probability 0, space 0, times 0 [ 340.381102][T10420] CPU: 1 PID: 10420 Comm: syz.2.3540 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 340.392298][T10420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 340.402192][T10420] Call Trace: [ 340.405312][T10420] [ 340.408091][T10420] dump_stack_lvl+0x151/0x1c0 [ 340.412604][T10420] ? io_uring_drop_tctx_refs+0x190/0x190 [ 340.418074][T10420] ? addrconf_f6i_alloc+0x362/0x4c0 [ 340.423107][T10420] dump_stack+0x15/0x20 [ 340.427097][T10420] should_fail+0x3c6/0x510 [ 340.431350][T10420] __should_failslab+0xa4/0xe0 [ 340.435949][T10420] should_failslab+0x9/0x20 [ 340.440289][T10420] slab_pre_alloc_hook+0x37/0xd0 [ 340.445064][T10420] __kmalloc+0x6d/0x270 [ 340.449157][T10420] ? fib6_info_alloc+0x33/0xe0 [ 340.453747][T10420] fib6_info_alloc+0x33/0xe0 [ 340.458170][T10420] ip6_route_info_create+0x50b/0x14c0 [ 340.463378][T10420] ip6_route_add+0x27/0x130 [ 340.467716][T10420] addrconf_add_linklocal+0x5b5/0x9e0 [ 340.472928][T10420] ? inet6_addr_del+0x550/0x550 [ 340.478047][T10420] ? ipv6_generate_stable_address+0x4db/0x650 [ 340.483962][T10420] ? in6_ifa_put+0x80/0x80 [ 340.488197][T10420] ? skb_gro_incr_csum_unnecessary+0x260/0x260 [ 340.494186][T10420] ? ipv6_addr_prefix+0x42/0x180 [ 340.498966][T10420] addrconf_addr_gen+0x886/0xd00 [ 340.503822][T10420] ? addrconf_sysctl_register+0x1a0/0x1a0 [ 340.509373][T10420] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 340.514237][T10420] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 340.519270][T10420] ? __kasan_check_write+0x14/0x20 [ 340.524216][T10420] ? ip6_route_add+0x102/0x130 [ 340.528816][T10420] ? addrconf_add_dev+0x415/0x610 [ 340.533676][T10420] ? ____kasan_kmalloc+0xdb/0x110 [ 340.538537][T10420] ? __kasan_kmalloc+0x9/0x10 [ 340.543051][T10420] ? local_bh_enable+0x30/0x30 [ 340.547648][T10420] ? __dev_notify_flags+0x304/0x610 [ 340.552687][T10420] ? __kasan_check_read+0x11/0x20 [ 340.557543][T10420] addrconf_init_auto_addrs+0xb8a/0x1060 [ 340.563012][T10420] ? addrconf_dad_run+0x610/0x610 [ 340.567872][T10420] ? __local_bh_enable_ip+0x58/0x80 [ 340.572907][T10420] ? _raw_write_unlock_bh+0x32/0x48 [ 340.577941][T10420] ? addrconf_permanent_addr+0xb40/0xba0 [ 340.583410][T10420] ? __kasan_check_write+0x14/0x20 [ 340.588354][T10420] ? addrconf_notify+0xdd0/0xdd0 [ 340.593130][T10420] ? igmpv3_del_delrec+0x740/0x740 [ 340.598078][T10420] ? __local_bh_enable_ip+0x58/0x80 [ 340.603112][T10420] ? __kasan_check_write+0x14/0x20 [ 340.608143][T10420] ? mutex_unlock+0xb2/0x260 [ 340.612570][T10420] ? tun_device_event+0x3ef/0xf80 [ 340.617432][T10420] ? __mutex_lock_slowpath+0x10/0x10 [ 340.622552][T10420] ? macsec_notify+0x101/0x4c0 [ 340.627151][T10420] ? addrconf_link_ready+0xfb/0x1e0 [ 340.632185][T10420] addrconf_notify+0x91d/0xdd0 [ 340.636789][T10420] raw_notifier_call_chain+0x8c/0xf0 [ 340.641908][T10420] __dev_notify_flags+0x304/0x610 [ 340.646767][T10420] ? __dev_change_flags+0x6e0/0x6e0 [ 340.651797][T10420] ? __dev_change_flags+0x569/0x6e0 [ 340.656835][T10420] ? avc_denied+0x1b0/0x1b0 [ 340.661175][T10420] ? dev_get_flags+0x1e0/0x1e0 [ 340.665776][T10420] dev_change_flags+0xf0/0x1a0 [ 340.670375][T10420] dev_ifsioc+0x147/0x10c0 [ 340.674627][T10420] ? dev_ioctl+0xe70/0xe70 [ 340.678878][T10420] ? mutex_lock+0x135/0x1e0 [ 340.683218][T10420] ? wait_for_completion_killable_timeout+0x10/0x10 [ 340.689643][T10420] dev_ioctl+0x54d/0xe70 [ 340.693721][T10420] sock_do_ioctl+0x34f/0x5a0 [ 340.698147][T10420] ? sock_show_fdinfo+0xa0/0xa0 [ 340.702846][T10420] ? selinux_file_ioctl+0x3cc/0x540 [ 340.707873][T10420] sock_ioctl+0x455/0x740 [ 340.712035][T10420] ? sock_poll+0x400/0x400 [ 340.716285][T10420] ? __fget_files+0x31e/0x380 [ 340.720800][T10420] ? security_file_ioctl+0x84/0xb0 [ 340.725747][T10420] ? sock_poll+0x400/0x400 [ 340.729999][T10420] __se_sys_ioctl+0x114/0x190 [ 340.734512][T10420] __x64_sys_ioctl+0x7b/0x90 [ 340.738937][T10420] x64_sys_call+0x98/0x9a0 [ 340.743196][T10420] do_syscall_64+0x3b/0xb0 [ 340.747443][T10420] ? clear_bhb_loop+0x35/0x90 [ 340.751957][T10420] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 340.757684][T10420] RIP: 0033:0x7f1b52dc7ef9 [ 340.761948][T10420] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 340.781381][T10420] RSP: 002b:00007f1b51a42038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 340.789623][T10420] RAX: ffffffffffffffda RBX: 00007f1b52f80f80 RCX: 00007f1b52dc7ef9 [ 340.797434][T10420] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000007 [ 340.805245][T10420] RBP: 00007f1b51a42090 R08: 0000000000000000 R09: 0000000000000000 [ 340.813058][T10420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 340.820869][T10420] R13: 0000000000000000 R14: 00007f1b52f80f80 R15: 00007ffea5c015b8 [ 340.828687][T10420] [ 340.869668][T10431] device pim6reg1 entered promiscuous mode [ 340.928060][T10439] device pim6reg1 entered promiscuous mode [ 340.972515][T10446] ------------[ cut here ]------------ [ 340.981761][T10446] trace type BPF program uses run-time allocation [ 340.988587][T10446] WARNING: CPU: 0 PID: 10446 at kernel/bpf/verifier.c:11685 check_map_prog_compatibility+0x6f1/0x890 [ 341.025490][T10446] Modules linked in: [ 341.029222][T10446] CPU: 0 PID: 10446 Comm: syz.0.3551 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 341.041769][T10446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 341.052727][T10446] RIP: 0010:check_map_prog_compatibility+0x6f1/0x890 [ 341.059269][T10446] Code: db e9 f9 fc ff ff e8 4e 33 ed ff 31 db e9 ed fc ff ff e8 42 33 ed ff c6 05 8d 1d a3 05 01 48 c7 c7 e0 de 87 85 e8 7f 68 be ff <0f> 0b e9 5a fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 84 f9 ff [ 341.079177][T10446] RSP: 0018:ffffc90000cbf328 EFLAGS: 00010246 [ 341.171067][T10446] RAX: 46aa6527ac44dc00 RBX: 0000000000000001 RCX: ffff8881284a8000 [ 341.192649][T10446] RDX: 0000000000000000 RSI: 0000000080000000 RDI: 0000000000000000 [ 341.200644][T10446] RBP: ffffc90000cbf370 R08: ffffffff81579755 R09: ffffed103ee065e8 [ 341.208548][T10446] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 341.216534][T10446] R13: ffff888122a00000 R14: ffffc90000129000 R15: dffffc0000000000 [ 341.238489][T10446] FS: 00007f49fdf4f6c0(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 341.258535][T10446] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 341.272579][T10446] CR2: 0000000000000000 CR3: 0000000116806000 CR4: 00000000003506a0 [ 341.314438][T10446] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 341.322748][T10446] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 341.358527][T10446] Call Trace: [ 341.362280][T10446] [ 341.365043][T10446] ? show_regs+0x58/0x60 [ 341.369123][T10446] ? __warn+0x160/0x2f0 [ 341.373233][T10446] ? check_map_prog_compatibility+0x6f1/0x890 [ 341.379117][T10446] ? report_bug+0x3d9/0x5b0 [ 341.383544][T10446] ? check_map_prog_compatibility+0x6f1/0x890 [ 341.389357][T10446] ? handle_bug+0x41/0x70 [ 341.395767][T10446] ? exc_invalid_op+0x1b/0x50 [ 341.400341][T10446] ? asm_exc_invalid_op+0x1b/0x20 [ 341.405704][T10446] ? __wake_up_klogd+0xd5/0x110 [ 341.410461][T10446] ? check_map_prog_compatibility+0x6f1/0x890 [ 341.416467][T10446] ? check_map_prog_compatibility+0x6f1/0x890 [ 341.422630][T10446] resolve_pseudo_ldimm64+0x671/0x1240 [ 341.435859][T10446] ? check_attach_btf_id+0xef0/0xef0 [ 341.441223][T10446] ? __mark_reg_known+0x1b0/0x1b0 [ 341.449036][T10446] ? security_capable+0x87/0xb0 [ 341.454994][T10446] bpf_check+0x3174/0x12bf0 [ 341.460948][T10446] ? 0xffffffffa0028000 [ 341.465410][T10446] ? is_bpf_text_address+0x172/0x190 [ 341.470730][T10446] ? stack_trace_save+0x1c0/0x1c0 [ 341.475892][T10446] ? __kernel_text_address+0x9b/0x110 [ 341.481214][T10446] ? unwind_get_return_address+0x4d/0x90 [ 341.487159][T10446] ? bpf_get_btf_vmlinux+0x60/0x60 [ 341.492778][T10446] ? arch_stack_walk+0xf3/0x140 [ 341.497570][T10446] ? stack_trace_save+0x113/0x1c0 [ 341.516468][T10446] ? stack_trace_snprint+0xf0/0xf0 [ 341.523474][T10446] ? stack_trace_snprint+0xf0/0xf0 [ 341.529139][T10446] ? __stack_depot_save+0x34/0x470 [ 341.534783][T10446] ? ____kasan_kmalloc+0xed/0x110 [ 341.539767][T10446] ? ____kasan_kmalloc+0xdb/0x110 [ 341.544882][T10446] ? __kasan_kmalloc+0x9/0x10 [ 341.549426][T10446] ? kmem_cache_alloc_trace+0x115/0x210 [ 341.555257][T10446] ? selinux_bpf_prog_alloc+0x51/0x140 [ 341.560595][T10446] ? security_bpf_prog_alloc+0x62/0x90 [ 341.566152][T10446] ? bpf_prog_load+0x9ee/0x1b50 [ 341.570876][T10446] ? __sys_bpf+0x4bc/0x760 [ 341.575317][T10446] ? __x64_sys_bpf+0x7c/0x90 [ 341.579911][T10446] ? x64_sys_call+0x87f/0x9a0 [ 341.584726][T10462] ¯Ê®¸}p: renamed from pim6reg1 [ 341.585096][T10446] ? do_syscall_64+0x3b/0xb0 [ 341.593774][T10446] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 341.594376][T10461] device pim6reg1 entered promiscuous mode [ 341.599654][T10446] ? __kasan_kmalloc+0x9/0x10 [ 341.599680][T10446] ? memset+0x35/0x40 [ 341.599696][T10446] ? bpf_obj_name_cpy+0x196/0x1e0 [ 341.619922][T10446] bpf_prog_load+0x12ac/0x1b50 [ 341.624583][T10446] ? map_freeze+0x370/0x370 [ 341.628903][T10446] ? selinux_bpf+0xcb/0x100 [ 341.633229][T10446] ? security_bpf+0x82/0xb0 [ 341.637581][T10446] __sys_bpf+0x4bc/0x760 [ 341.641659][T10446] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 341.646954][T10446] ? debug_smp_processor_id+0x17/0x20 [ 341.652248][T10446] ? perf_trace_sys_enter+0x30/0x140 [ 341.657552][T10446] __x64_sys_bpf+0x7c/0x90 [ 341.661748][T10446] x64_sys_call+0x87f/0x9a0 [ 341.679820][T10446] do_syscall_64+0x3b/0xb0 [ 341.684153][T10446] ? clear_bhb_loop+0x35/0x90 [ 341.688675][T10446] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 341.694695][T10446] RIP: 0033:0x7f49ff2d4ef9 [ 341.699096][T10446] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 341.719101][T10446] RSP: 002b:00007f49fdf4f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 341.727512][T10446] RAX: ffffffffffffffda RBX: 00007f49ff48df80 RCX: 00007f49ff2d4ef9 [ 341.735412][T10446] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 341.743455][T10446] RBP: 00007f49ff34701e R08: 0000000000000000 R09: 0000000000000000 [ 341.751295][T10446] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 341.759159][T10446] R13: 0000000000000000 R14: 00007f49ff48df80 R15: 00007ffdf5a3c118 [ 341.766981][T10446] [ 341.769799][T10446] ---[ end trace d919259c951fb728 ]--- [ 342.089241][T10492] syz.1.3567[10492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.089328][T10492] syz.1.3567[10492] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.436844][T10519] device syzkaller0 entered promiscuous mode [ 346.594971][T10524] device pim6reg1 entered promiscuous mode [ 346.652067][T10527] ¯Ê®¸}p: renamed from pim6reg1 [ 346.668752][T10530] device pim6reg1 entered promiscuous mode [ 346.701425][T10534] syz.2.3580[10534] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.701486][T10534] syz.2.3580[10534] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 346.729101][T10536] device pim6reg1 entered promiscuous mode [ 346.750327][T10536] FAULT_INJECTION: forcing a failure. [ 346.750327][T10536] name failslab, interval 1, probability 0, space 0, times 0 [ 346.798888][T10536] CPU: 1 PID: 10536 Comm: syz.4.3581 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 346.810131][T10536] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 346.820015][T10536] Call Trace: [ 346.823136][T10536] [ 346.825915][T10536] dump_stack_lvl+0x151/0x1c0 [ 346.830425][T10536] ? io_uring_drop_tctx_refs+0x190/0x190 [ 346.835894][T10536] ? arch_stack_walk+0xf3/0x140 [ 346.840588][T10536] dump_stack+0x15/0x20 [ 346.844571][T10536] should_fail+0x3c6/0x510 [ 346.848825][T10536] __should_failslab+0xa4/0xe0 [ 346.853473][T10536] should_failslab+0x9/0x20 [ 346.857764][T10536] slab_pre_alloc_hook+0x37/0xd0 [ 346.862538][T10536] __kmalloc+0x6d/0x270 [ 346.866619][T10536] ? fib6_info_alloc+0x33/0xe0 [ 346.871219][T10536] fib6_info_alloc+0x33/0xe0 [ 346.875644][T10536] ip6_route_info_create+0x50b/0x14c0 [ 346.880865][T10536] ? __dev_notify_flags+0x304/0x610 [ 346.885884][T10536] ? dev_change_flags+0xf0/0x1a0 [ 346.890671][T10536] ? dev_ifsioc+0x147/0x10c0 [ 346.895096][T10536] ? memcpy+0x56/0x70 [ 346.898907][T10536] addrconf_f6i_alloc+0x215/0x4c0 [ 346.903765][T10536] ? ip6_route_del+0xfe0/0xfe0 [ 346.908369][T10536] ? __kasan_kmalloc+0x9/0x10 [ 346.912892][T10536] ? ipv6_add_addr+0x419/0xd40 [ 346.917476][T10536] ipv6_add_addr+0x44e/0xd40 [ 346.921904][T10536] ? ipv6_generate_stable_address+0x650/0x650 [ 346.927804][T10536] ? crng_make_state+0x331/0x570 [ 346.932579][T10536] addrconf_add_linklocal+0x318/0x9e0 [ 346.937786][T10536] ? inet6_addr_del+0x550/0x550 [ 346.942475][T10536] ? __local_bh_enable_ip+0x58/0x80 [ 346.947507][T10536] ? _raw_spin_unlock_bh+0x51/0x60 [ 346.952453][T10536] ? ipv6_generate_stable_address+0x4db/0x650 [ 346.958360][T10536] ? in6_ifa_put+0x80/0x80 [ 346.962606][T10536] ? skb_gro_incr_csum_unnecessary+0x260/0x260 [ 346.968595][T10536] ? ipv6_addr_prefix+0x42/0x180 [ 346.973382][T10536] addrconf_addr_gen+0x886/0xd00 [ 346.978153][T10536] ? addrconf_sysctl_register+0x1a0/0x1a0 [ 346.983698][T10536] ? _raw_spin_lock_bh+0xa4/0x1b0 [ 346.988559][T10536] ? _raw_spin_lock_irq+0x1b0/0x1b0 [ 346.993598][T10536] ? __kasan_check_write+0x14/0x20 [ 346.998539][T10536] ? ip6_route_add+0x102/0x130 [ 347.003145][T10536] ? addrconf_add_dev+0x415/0x610 [ 347.008006][T10536] ? ____kasan_kmalloc+0xdb/0x110 [ 347.012861][T10536] ? __kasan_kmalloc+0x9/0x10 [ 347.017373][T10536] ? local_bh_enable+0x30/0x30 [ 347.022067][T10536] ? __dev_notify_flags+0x304/0x610 [ 347.027105][T10536] ? __kasan_check_read+0x11/0x20 [ 347.031961][T10536] addrconf_init_auto_addrs+0xb8a/0x1060 [ 347.037431][T10536] ? addrconf_dad_run+0x610/0x610 [ 347.042290][T10536] ? __local_bh_enable_ip+0x58/0x80 [ 347.047322][T10536] ? _raw_write_unlock_bh+0x32/0x48 [ 347.052356][T10536] ? addrconf_permanent_addr+0xb40/0xba0 [ 347.057826][T10536] ? __kasan_check_write+0x14/0x20 [ 347.062773][T10536] ? addrconf_notify+0xdd0/0xdd0 [ 347.067545][T10536] ? igmpv3_del_delrec+0x740/0x740 [ 347.072503][T10536] ? __local_bh_enable_ip+0x58/0x80 [ 347.077528][T10536] ? __kasan_check_write+0x14/0x20 [ 347.082908][T10536] ? mutex_unlock+0xb2/0x260 [ 347.087337][T10536] ? tun_device_event+0x3ef/0xf80 [ 347.092196][T10536] ? __mutex_lock_slowpath+0x10/0x10 [ 347.097314][T10536] ? macsec_notify+0x101/0x4c0 [ 347.101919][T10536] ? addrconf_link_ready+0xfb/0x1e0 [ 347.106950][T10536] addrconf_notify+0x91d/0xdd0 [ 347.111556][T10536] raw_notifier_call_chain+0x8c/0xf0 [ 347.116670][T10536] __dev_notify_flags+0x304/0x610 [ 347.121530][T10536] ? __dev_change_flags+0x6e0/0x6e0 [ 347.126562][T10536] ? __dev_change_flags+0x569/0x6e0 [ 347.131597][T10536] ? avc_denied+0x1b0/0x1b0 [ 347.135941][T10536] ? dev_get_flags+0x1e0/0x1e0 [ 347.140553][T10536] ? _kstrtoull+0x3a0/0x4a0 [ 347.144879][T10536] dev_change_flags+0xf0/0x1a0 [ 347.149479][T10536] dev_ifsioc+0x147/0x10c0 [ 347.153732][T10536] ? dev_ioctl+0xe70/0xe70 [ 347.157982][T10536] ? mutex_lock+0xb6/0x1e0 [ 347.162237][T10536] ? wait_for_completion_killable_timeout+0x10/0x10 [ 347.168681][T10536] dev_ioctl+0x54d/0xe70 [ 347.172740][T10536] sock_do_ioctl+0x34f/0x5a0 [ 347.177172][T10536] ? sock_show_fdinfo+0xa0/0xa0 [ 347.181852][T10536] ? selinux_file_ioctl+0x3cc/0x540 [ 347.186970][T10536] sock_ioctl+0x455/0x740 [ 347.191135][T10536] ? sock_poll+0x400/0x400 [ 347.195389][T10536] ? __fget_files+0x31e/0x380 [ 347.199905][T10536] ? security_file_ioctl+0x84/0xb0 [ 347.204850][T10536] ? sock_poll+0x400/0x400 [ 347.209101][T10536] __se_sys_ioctl+0x114/0x190 [ 347.213631][T10536] __x64_sys_ioctl+0x7b/0x90 [ 347.218041][T10536] x64_sys_call+0x98/0x9a0 [ 347.222295][T10536] do_syscall_64+0x3b/0xb0 [ 347.226544][T10536] ? clear_bhb_loop+0x35/0x90 [ 347.231061][T10536] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 347.236788][T10536] RIP: 0033:0x7f9ea3555ef9 [ 347.241044][T10536] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 347.260568][T10536] RSP: 002b:00007f9ea21d0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 347.268817][T10536] RAX: ffffffffffffffda RBX: 00007f9ea370ef80 RCX: 00007f9ea3555ef9 [ 347.276628][T10536] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000007 [ 347.284437][T10536] RBP: 00007f9ea21d0090 R08: 0000000000000000 R09: 0000000000000000 [ 347.292274][T10536] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 347.300403][T10536] R13: 0000000000000000 R14: 00007f9ea370ef80 R15: 00007fff2a51b0a8 [ 347.308318][T10536] [ 347.431479][T10561] device pim6reg1 entered promiscuous mode [ 347.625071][T10569] device pim6reg1 entered promiscuous mode [ 347.856341][T10571] ¯Ê®¸}p: renamed from pim6reg1 [ 347.887376][T10576] syz.1.3595[10576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 347.887462][T10576] syz.1.3595[10576] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 348.634098][T10604] device pim6reg1 entered promiscuous mode [ 348.743924][T10614] device pim6reg1 entered promiscuous mode [ 348.885803][T10619] device veth1_macvtap left promiscuous mode [ 349.774404][T10638] ¯Ê®¸}p: renamed from pim6reg1 [ 349.797707][T10644] device pim6reg1 entered promiscuous mode [ 349.803498][T10644] FAULT_INJECTION: forcing a failure. [ 349.803498][T10644] name failslab, interval 1, probability 0, space 0, times 0 [ 349.815931][T10644] CPU: 1 PID: 10644 Comm: syz.1.3620 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 349.827089][T10644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 349.836984][T10644] Call Trace: [ 349.840103][T10644] [ 349.842882][T10644] dump_stack_lvl+0x151/0x1c0 [ 349.847395][T10644] ? io_uring_drop_tctx_refs+0x190/0x190 [ 349.852867][T10644] dump_stack+0x15/0x20 [ 349.856854][T10644] should_fail+0x3c6/0x510 [ 349.861110][T10644] __should_failslab+0xa4/0xe0 [ 349.865709][T10644] should_failslab+0x9/0x20 [ 349.870050][T10644] slab_pre_alloc_hook+0x37/0xd0 [ 349.874909][T10644] __kmalloc+0x6d/0x270 [ 349.878900][T10644] ? fib6_info_alloc+0x33/0xe0 [ 349.883500][T10644] fib6_info_alloc+0x33/0xe0 [ 349.887928][T10644] ip6_route_info_create+0x50b/0x14c0 [ 349.893132][T10644] ? __mutex_lock_slowpath+0x10/0x10 [ 349.898259][T10644] ip6_route_add+0x27/0x130 [ 349.902595][T10644] addrconf_add_dev+0x415/0x610 [ 349.907367][T10644] ? ____kasan_kmalloc+0xdb/0x110 [ 349.912227][T10644] ? __kasan_kmalloc+0x9/0x10 [ 349.916740][T10644] ? local_bh_enable+0x30/0x30 [ 349.921342][T10644] ? __dev_notify_flags+0x304/0x610 [ 349.926379][T10644] ? __kasan_check_read+0x11/0x20 [ 349.931235][T10644] addrconf_init_auto_addrs+0xad0/0x1060 [ 349.936708][T10644] ? addrconf_dad_run+0x610/0x610 [ 349.941561][T10644] ? __local_bh_enable_ip+0x58/0x80 [ 349.946599][T10644] ? _raw_write_unlock_bh+0x32/0x48 [ 349.951633][T10644] ? addrconf_permanent_addr+0xb40/0xba0 [ 349.957101][T10644] ? __kasan_check_write+0x14/0x20 [ 349.962052][T10644] ? addrconf_notify+0xdd0/0xdd0 [ 349.966821][T10644] ? igmpv3_del_delrec+0x740/0x740 [ 349.971768][T10644] ? __local_bh_enable_ip+0x58/0x80 [ 349.976898][T10644] ? __kasan_check_write+0x14/0x20 [ 349.981835][T10644] ? mutex_unlock+0xb2/0x260 [ 349.986267][T10644] ? tun_device_event+0x3ef/0xf80 [ 349.991124][T10644] ? __mutex_lock_slowpath+0x10/0x10 [ 349.996242][T10644] ? macsec_notify+0x101/0x4c0 [ 350.000844][T10644] ? addrconf_link_ready+0xfb/0x1e0 [ 350.005965][T10644] addrconf_notify+0x91d/0xdd0 [ 350.010573][T10644] raw_notifier_call_chain+0x8c/0xf0 [ 350.015684][T10644] __dev_notify_flags+0x304/0x610 [ 350.020544][T10644] ? __dev_change_flags+0x6e0/0x6e0 [ 350.025578][T10644] ? __dev_change_flags+0x569/0x6e0 [ 350.030616][T10644] ? dev_get_flags+0x1e0/0x1e0 [ 350.035211][T10644] ? __request_module+0x3fa/0x8e0 [ 350.040159][T10644] ? capable+0x78/0xe0 [ 350.044065][T10644] dev_change_flags+0xf0/0x1a0 [ 350.048665][T10644] dev_ifsioc+0x147/0x10c0 [ 350.052918][T10644] ? dev_ioctl+0xe70/0xe70 [ 350.057168][T10644] ? mutex_lock+0x135/0x1e0 [ 350.061545][T10644] ? wait_for_completion_killable_timeout+0x10/0x10 [ 350.067933][T10644] ? security_capable+0x87/0xb0 [ 350.072621][T10644] dev_ioctl+0x54d/0xe70 [ 350.076699][T10644] sock_do_ioctl+0x34f/0x5a0 [ 350.081127][T10644] ? sock_show_fdinfo+0xa0/0xa0 [ 350.085825][T10644] ? selinux_file_ioctl+0x3cc/0x540 [ 350.090933][T10644] sock_ioctl+0x455/0x740 [ 350.095100][T10644] ? sock_poll+0x400/0x400 [ 350.099351][T10644] ? __fget_files+0x31e/0x380 [ 350.103865][T10644] ? security_file_ioctl+0x84/0xb0 [ 350.108881][T10644] ? sock_poll+0x400/0x400 [ 350.113073][T10644] __se_sys_ioctl+0x114/0x190 [ 350.117578][T10644] __x64_sys_ioctl+0x7b/0x90 [ 350.122006][T10644] x64_sys_call+0x98/0x9a0 [ 350.126255][T10644] do_syscall_64+0x3b/0xb0 [ 350.130509][T10644] ? clear_bhb_loop+0x35/0x90 [ 350.135020][T10644] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 350.140751][T10644] RIP: 0033:0x7f6e33cf3ef9 [ 350.145003][T10644] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 350.164442][T10644] RSP: 002b:00007f6e3294d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 350.172693][T10644] RAX: ffffffffffffffda RBX: 00007f6e33ead058 RCX: 00007f6e33cf3ef9 [ 350.180510][T10644] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000007 [ 350.188313][T10644] RBP: 00007f6e3294d090 R08: 0000000000000000 R09: 0000000000000000 [ 350.196122][T10644] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 350.203935][T10644] R13: 0000000000000000 R14: 00007f6e33ead058 R15: 00007fff7583b518 [ 350.211753][T10644] [ 350.314302][T10649] device pim6reg1 entered promiscuous mode [ 350.359406][T10654] device pim6reg1 entered promiscuous mode [ 350.497583][T10661] syz.3.3627[10661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.497669][T10661] syz.3.3627[10661] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.572421][T10663] syz.0.3629[10663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.657879][T10646] device veth0_vlan left promiscuous mode [ 350.675512][T10668] FAULT_INJECTION: forcing a failure. [ 350.675512][T10668] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 350.676497][T10663] syz.0.3629[10663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.688470][T10668] CPU: 0 PID: 10668 Comm: syz.3.3627 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 350.710843][T10668] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 350.720736][T10668] Call Trace: [ 350.723861][T10668] [ 350.726638][T10668] dump_stack_lvl+0x151/0x1c0 [ 350.731153][T10668] ? io_uring_drop_tctx_refs+0x190/0x190 [ 350.736639][T10668] dump_stack+0x15/0x20 [ 350.740608][T10668] should_fail+0x3c6/0x510 [ 350.744881][T10668] should_fail_usercopy+0x1a/0x20 [ 350.749722][T10668] _copy_from_user+0x20/0xd0 [ 350.754149][T10668] __sys_bpf+0x1e9/0x760 [ 350.758230][T10668] ? fput_many+0x160/0x1b0 [ 350.762478][T10668] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 350.767689][T10668] ? debug_smp_processor_id+0x17/0x20 [ 350.772894][T10668] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 350.778882][T10668] __x64_sys_bpf+0x7c/0x90 [ 350.783135][T10668] x64_sys_call+0x87f/0x9a0 [ 350.787473][T10668] do_syscall_64+0x3b/0xb0 [ 350.791728][T10668] ? clear_bhb_loop+0x35/0x90 [ 350.796241][T10668] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 350.801969][T10668] RIP: 0033:0x7f7a8e3ccef9 [ 350.806223][T10668] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 350.825663][T10668] RSP: 002b:00007f7a8d026038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 350.833908][T10668] RAX: ffffffffffffffda RBX: 00007f7a8e586058 RCX: 00007f7a8e3ccef9 [ 350.841717][T10668] RDX: 000000000000000c RSI: 00000000200004c0 RDI: 000000000000000a [ 350.849529][T10668] RBP: 00007f7a8d026090 R08: 0000000000000000 R09: 0000000000000000 [ 350.857341][T10668] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 350.865151][T10668] R13: 0000000000000001 R14: 00007f7a8e586058 R15: 00007ffd92823cd8 [ 350.872968][T10668] [ 350.896261][T10646] device veth0_vlan entered promiscuous mode [ 350.907220][T10672] syz.0.3632[10672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.907308][T10672] syz.0.3632[10672] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 350.917248][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 350.956083][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 350.972607][ T309] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 351.322480][T10686] ¯Ê®¸}p: renamed from pim6reg1 [ 351.335528][T10693] device pim6reg1 entered promiscuous mode [ 351.445626][T10698] device pim6reg1 entered promiscuous mode [ 352.368002][T10727] ¯Ê®¸}p: renamed from pim6reg1 [ 352.386687][T10730] device pim6reg1 entered promiscuous mode [ 352.442491][T10744] device pim6reg1 entered promiscuous mode [ 352.487872][T10752] device pim6reg1 entered promiscuous mode [ 352.505947][T10752] FAULT_INJECTION: forcing a failure. [ 352.505947][T10752] name failslab, interval 1, probability 0, space 0, times 0 [ 352.519476][T10752] CPU: 0 PID: 10752 Comm: syz.1.3662 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 352.531226][T10752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 352.541205][T10752] Call Trace: [ 352.544328][T10752] [ 352.547107][T10752] dump_stack_lvl+0x151/0x1c0 [ 352.551622][T10752] ? io_uring_drop_tctx_refs+0x190/0x190 [ 352.557084][T10752] ? fib6_clean_all+0x269/0x2c0 [ 352.561772][T10752] ? rt6_sync_up+0x1f0/0x1f0 [ 352.566199][T10752] dump_stack+0x15/0x20 [ 352.570190][T10752] should_fail+0x3c6/0x510 [ 352.574446][T10752] __should_failslab+0xa4/0xe0 [ 352.579043][T10752] ? __alloc_skb+0xbe/0x550 [ 352.583384][T10752] should_failslab+0x9/0x20 [ 352.587810][T10752] slab_pre_alloc_hook+0x37/0xd0 [ 352.592585][T10752] ? __alloc_skb+0xbe/0x550 [ 352.596923][T10752] kmem_cache_alloc+0x44/0x200 [ 352.601525][T10752] __alloc_skb+0xbe/0x550 [ 352.605690][T10752] inet6_ifinfo_notify+0x70/0x110 [ 352.610552][T10752] addrconf_notify+0xa8d/0xdd0 [ 352.615151][T10752] raw_notifier_call_chain+0x8c/0xf0 [ 352.620270][T10752] __dev_notify_flags+0x304/0x610 [ 352.625143][T10752] ? __dev_change_flags+0x6e0/0x6e0 [ 352.630168][T10752] ? __dev_change_flags+0x569/0x6e0 [ 352.635219][T10752] ? avc_denied+0x1b0/0x1b0 [ 352.639540][T10752] ? dev_get_flags+0x1e0/0x1e0 [ 352.644150][T10752] ? _kstrtoull+0x3a0/0x4a0 [ 352.648803][T10752] dev_change_flags+0xf0/0x1a0 [ 352.653394][T10752] dev_ifsioc+0x147/0x10c0 [ 352.657648][T10752] ? dev_ioctl+0xe70/0xe70 [ 352.661895][T10752] ? mutex_lock+0xb6/0x1e0 [ 352.666150][T10752] ? wait_for_completion_killable_timeout+0x10/0x10 [ 352.672575][T10752] dev_ioctl+0x54d/0xe70 [ 352.676650][T10752] sock_do_ioctl+0x34f/0x5a0 [ 352.681076][T10752] ? sock_show_fdinfo+0xa0/0xa0 [ 352.685764][T10752] ? selinux_file_ioctl+0x3cc/0x540 [ 352.690798][T10752] sock_ioctl+0x455/0x740 [ 352.694964][T10752] ? sock_poll+0x400/0x400 [ 352.699215][T10752] ? __fget_files+0x31e/0x380 [ 352.703732][T10752] ? security_file_ioctl+0x84/0xb0 [ 352.708678][T10752] ? sock_poll+0x400/0x400 [ 352.712929][T10752] __se_sys_ioctl+0x114/0x190 [ 352.717444][T10752] __x64_sys_ioctl+0x7b/0x90 [ 352.721868][T10752] x64_sys_call+0x98/0x9a0 [ 352.726121][T10752] do_syscall_64+0x3b/0xb0 [ 352.730373][T10752] ? clear_bhb_loop+0x35/0x90 [ 352.734888][T10752] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 352.740615][T10752] RIP: 0033:0x7f6e33cf3ef9 [ 352.744870][T10752] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 352.764397][T10752] RSP: 002b:00007f6e3296e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 352.772640][T10752] RAX: ffffffffffffffda RBX: 00007f6e33eacf80 RCX: 00007f6e33cf3ef9 [ 352.780460][T10752] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000007 [ 352.788269][T10752] RBP: 00007f6e3296e090 R08: 0000000000000000 R09: 0000000000000000 [ 352.796086][T10752] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 352.803884][T10752] R13: 0000000000000000 R14: 00007f6e33eacf80 R15: 00007fff7583b518 [ 352.811704][T10752] [ 352.868575][T10763] syz.2.3666[10763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 352.868669][T10763] syz.2.3666[10763] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 352.940722][T10773] syz.1.3667[10773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.054156][T10773] syz.1.3667[10773] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.147557][T10777] device pim6reg1 entered promiscuous mode [ 353.164787][T10778] FAULT_INJECTION: forcing a failure. [ 353.164787][T10778] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 353.232187][T10778] CPU: 1 PID: 10778 Comm: syz.1.3667 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 353.243391][T10778] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 353.253286][T10778] Call Trace: [ 353.256407][T10778] [ 353.259183][T10778] dump_stack_lvl+0x151/0x1c0 [ 353.263699][T10778] ? io_uring_drop_tctx_refs+0x190/0x190 [ 353.269164][T10778] ? kstrtouint_from_user+0x20a/0x2a0 [ 353.274379][T10778] dump_stack+0x15/0x20 [ 353.278364][T10778] should_fail+0x3c6/0x510 [ 353.282625][T10778] should_fail_usercopy+0x1a/0x20 [ 353.287480][T10778] _copy_to_user+0x20/0x90 [ 353.291735][T10778] simple_read_from_buffer+0xc7/0x150 [ 353.296938][T10778] proc_fail_nth_read+0x1a3/0x210 [ 353.301799][T10778] ? proc_fault_inject_write+0x390/0x390 [ 353.307267][T10778] ? fsnotify_perm+0x470/0x5d0 [ 353.311872][T10778] ? security_file_permission+0x86/0xb0 [ 353.317248][T10778] ? proc_fault_inject_write+0x390/0x390 [ 353.322714][T10778] vfs_read+0x27d/0xd40 [ 353.326705][T10778] ? kernel_read+0x1f0/0x1f0 [ 353.331131][T10778] ? __kasan_check_write+0x14/0x20 [ 353.336088][T10778] ? mutex_lock+0xb6/0x1e0 [ 353.340422][T10778] ? wait_for_completion_killable_timeout+0x10/0x10 [ 353.346845][T10778] ? __fdget_pos+0x2e7/0x3a0 [ 353.351270][T10778] ? ksys_read+0x77/0x2c0 [ 353.355433][T10778] ksys_read+0x199/0x2c0 [ 353.359513][T10778] ? vfs_write+0x1110/0x1110 [ 353.363938][T10778] ? debug_smp_processor_id+0x17/0x20 [ 353.369147][T10778] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 353.375058][T10778] __x64_sys_read+0x7b/0x90 [ 353.379389][T10778] x64_sys_call+0x28/0x9a0 [ 353.383639][T10778] do_syscall_64+0x3b/0xb0 [ 353.387891][T10778] ? clear_bhb_loop+0x35/0x90 [ 353.392406][T10778] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 353.398134][T10778] RIP: 0033:0x7f6e33cf293c [ 353.402389][T10778] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 353.421828][T10778] RSP: 002b:00007f6e3292c030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 353.430073][T10778] RAX: ffffffffffffffda RBX: 00007f6e33ead130 RCX: 00007f6e33cf293c [ 353.437893][T10778] RDX: 000000000000000f RSI: 00007f6e3292c0a0 RDI: 0000000000000005 [ 353.445711][T10778] RBP: 00007f6e3292c090 R08: 0000000000000000 R09: 0000000000000000 [ 353.453508][T10778] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 353.461321][T10778] R13: 0000000000000001 R14: 00007f6e33ead130 R15: 00007fff7583b518 [ 353.469137][T10778] [ 353.849856][T10786] ¯Ê®¸}p: renamed from pim6reg1 [ 354.421677][T10806] device pim6reg1 entered promiscuous mode [ 354.444180][T10814] device syzkaller0 entered promiscuous mode [ 354.561613][T10825] device pim6reg1 entered promiscuous mode [ 355.014140][T10839] ¯Ê®¸}p: renamed from pim6reg1 [ 355.171568][T10851] device pim6reg1 entered promiscuous mode [ 355.191425][T10853] device pim6reg1 entered promiscuous mode [ 355.219191][T10856] device pim6reg1 entered promiscuous mode [ 355.249441][T10865] syz.3.3704[10865] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.249532][T10865] syz.3.3704[10865] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 355.276464][T10869] device pim6reg1 entered promiscuous mode [ 355.313792][T10869] FAULT_INJECTION: forcing a failure. [ 355.313792][T10869] name failslab, interval 1, probability 0, space 0, times 0 [ 355.331085][T10869] CPU: 1 PID: 10869 Comm: syz.4.3703 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 355.342295][T10869] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 355.352186][T10869] Call Trace: [ 355.355314][T10869] [ 355.358102][T10869] dump_stack_lvl+0x151/0x1c0 [ 355.362611][T10869] ? io_uring_drop_tctx_refs+0x190/0x190 [ 355.368069][T10869] ? fib6_clean_all+0x269/0x2c0 [ 355.372753][T10869] ? rt6_sync_up+0x1f0/0x1f0 [ 355.377184][T10869] dump_stack+0x15/0x20 [ 355.381171][T10869] should_fail+0x3c6/0x510 [ 355.385425][T10869] __should_failslab+0xa4/0xe0 [ 355.390021][T10869] ? __alloc_skb+0xbe/0x550 [ 355.394361][T10869] should_failslab+0x9/0x20 [ 355.398701][T10869] slab_pre_alloc_hook+0x37/0xd0 [ 355.403476][T10869] ? __alloc_skb+0xbe/0x550 [ 355.407822][T10869] kmem_cache_alloc+0x44/0x200 [ 355.412414][T10869] __alloc_skb+0xbe/0x550 [ 355.416582][T10869] inet6_ifinfo_notify+0x70/0x110 [ 355.421451][T10869] addrconf_notify+0xa8d/0xdd0 [ 355.426204][T10869] raw_notifier_call_chain+0x8c/0xf0 [ 355.431312][T10869] __dev_notify_flags+0x304/0x610 [ 355.436171][T10869] ? __dev_change_flags+0x6e0/0x6e0 [ 355.441203][T10869] ? __dev_change_flags+0x569/0x6e0 [ 355.446247][T10869] ? avc_denied+0x1b0/0x1b0 [ 355.450576][T10869] ? dev_get_flags+0x1e0/0x1e0 [ 355.455176][T10869] ? _kstrtoull+0x3a0/0x4a0 [ 355.459516][T10869] dev_change_flags+0xf0/0x1a0 [ 355.464205][T10869] dev_ifsioc+0x147/0x10c0 [ 355.468455][T10869] ? dev_ioctl+0xe70/0xe70 [ 355.472710][T10869] ? mutex_lock+0xb6/0x1e0 [ 355.476960][T10869] ? wait_for_completion_killable_timeout+0x10/0x10 [ 355.483395][T10869] dev_ioctl+0x54d/0xe70 [ 355.487461][T10869] sock_do_ioctl+0x34f/0x5a0 [ 355.491897][T10869] ? sock_show_fdinfo+0xa0/0xa0 [ 355.496580][T10869] ? selinux_file_ioctl+0x3cc/0x540 [ 355.501613][T10869] sock_ioctl+0x455/0x740 [ 355.505780][T10869] ? sock_poll+0x400/0x400 [ 355.510028][T10869] ? __fget_files+0x31e/0x380 [ 355.514543][T10869] ? security_file_ioctl+0x84/0xb0 [ 355.519486][T10869] ? sock_poll+0x400/0x400 [ 355.523741][T10869] __se_sys_ioctl+0x114/0x190 [ 355.528259][T10869] __x64_sys_ioctl+0x7b/0x90 [ 355.532682][T10869] x64_sys_call+0x98/0x9a0 [ 355.536933][T10869] do_syscall_64+0x3b/0xb0 [ 355.541187][T10869] ? clear_bhb_loop+0x35/0x90 [ 355.545699][T10869] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 355.551429][T10869] RIP: 0033:0x7f9ea3555ef9 [ 355.555681][T10869] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 355.575122][T10869] RSP: 002b:00007f9ea21d0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 355.583367][T10869] RAX: ffffffffffffffda RBX: 00007f9ea370ef80 RCX: 00007f9ea3555ef9 [ 355.591183][T10869] RDX: 0000000020000100 RSI: 0000000000008914 RDI: 0000000000000007 [ 355.598987][T10869] RBP: 00007f9ea21d0090 R08: 0000000000000000 R09: 0000000000000000 [ 355.606798][T10869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 355.614609][T10869] R13: 0000000000000000 R14: 00007f9ea370ef80 R15: 00007fff2a51b0a8 [ 355.622426][T10869] [ 355.824305][T10882] ¯Ê®¸}p: renamed from pim6reg1 [ 355.907661][T10895] device pim6reg1 entered promiscuous mode [ 355.984483][T10907] device pim6reg1 entered promiscuous mode [ 356.645217][T10931] ¯Ê®¸}p: renamed from pim6reg1 [ 356.698233][T10943] device pim6reg1 entered promiscuous mode [ 356.777334][T10949] device pim6reg1 entered promiscuous mode [ 356.792414][T10949] FAULT_INJECTION: forcing a failure. [ 356.792414][T10949] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 356.844475][T10961] syz.4.3741[10961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.844568][T10961] syz.4.3741[10961] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 356.864604][T10949] CPU: 1 PID: 10949 Comm: syz.3.3735 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 356.887099][T10949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 356.897081][T10949] Call Trace: [ 356.900204][T10949] [ 356.902980][T10949] dump_stack_lvl+0x151/0x1c0 [ 356.907493][T10949] ? io_uring_drop_tctx_refs+0x190/0x190 [ 356.912963][T10949] dump_stack+0x15/0x20 [ 356.916960][T10949] should_fail+0x3c6/0x510 [ 356.921303][T10949] should_fail_usercopy+0x1a/0x20 [ 356.926331][T10949] _copy_to_user+0x20/0x90 [ 356.930596][T10949] simple_read_from_buffer+0xc7/0x150 [ 356.935790][T10949] proc_fail_nth_read+0x1a3/0x210 [ 356.940646][T10949] ? proc_fault_inject_write+0x390/0x390 [ 356.946115][T10949] ? fsnotify_perm+0x470/0x5d0 [ 356.950712][T10949] ? security_file_permission+0x86/0xb0 [ 356.956092][T10949] ? proc_fault_inject_write+0x390/0x390 [ 356.961563][T10949] vfs_read+0x27d/0xd40 [ 356.965553][T10949] ? sock_show_fdinfo+0xa0/0xa0 [ 356.970240][T10949] ? kernel_read+0x1f0/0x1f0 [ 356.974668][T10949] ? __kasan_check_write+0x14/0x20 [ 356.979615][T10949] ? mutex_lock+0xb6/0x1e0 [ 356.983867][T10949] ? wait_for_completion_killable_timeout+0x10/0x10 [ 356.990385][T10949] ? __fdget_pos+0x2e7/0x3a0 [ 356.994895][T10949] ? ksys_read+0x77/0x2c0 [ 356.999063][T10949] ksys_read+0x199/0x2c0 [ 357.003146][T10949] ? __kasan_check_write+0x14/0x20 [ 357.008088][T10949] ? vfs_write+0x1110/0x1110 [ 357.012516][T10949] ? __kasan_check_read+0x11/0x20 [ 357.017377][T10949] __x64_sys_read+0x7b/0x90 [ 357.021715][T10949] x64_sys_call+0x28/0x9a0 [ 357.025969][T10949] do_syscall_64+0x3b/0xb0 [ 357.030220][T10949] ? clear_bhb_loop+0x35/0x90 [ 357.034733][T10949] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 357.040462][T10949] RIP: 0033:0x7f7a8e3cb93c [ 357.044716][T10949] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 357.064156][T10949] RSP: 002b:00007f7a8d047030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 357.072401][T10949] RAX: ffffffffffffffda RBX: 00007f7a8e585f80 RCX: 00007f7a8e3cb93c [ 357.080212][T10949] RDX: 000000000000000f RSI: 00007f7a8d0470a0 RDI: 0000000000000008 [ 357.088027][T10949] RBP: 00007f7a8d047090 R08: 0000000000000000 R09: 0000000000000000 [ 357.095924][T10949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 357.103733][T10949] R13: 0000000000000000 R14: 00007f7a8e585f80 R15: 00007ffd92823cd8 [ 357.111549][T10949] [ 357.150298][T10967] device pim6reg1 entered promiscuous mode [ 357.501169][T10974] ¯Ê®¸}p: renamed from pim6reg1 [ 357.865226][T10993] device pim6reg1 entered promiscuous mode [ 358.130446][T11005] device pim6reg1 entered promiscuous mode [ 359.000943][T11029] ¯Ê®¸}p: renamed from pim6reg1 [ 359.120371][T11036] device pim6reg1 entered promiscuous mode [ 359.267813][T11041] device pim6reg1 entered promiscuous mode [ 360.648513][T11074] ¯Ê®¸}p: renamed from pim6reg1 [ 360.682812][T11079] device pim6reg1 entered promiscuous mode [ 360.972083][T11081] ¯Ê®¸}p: renamed from pim6reg1 [ 360.990358][T11094] device pim6reg1 entered promiscuous mode [ 361.607810][T11116] device pim6reg1 entered promiscuous mode [ 361.786911][T11121] ¯Ê®¸}p: renamed from pim6reg1 [ 361.831905][T11128] device pim6reg1 entered promiscuous mode [ 362.186124][T11142] ¯Ê®¸}p: renamed from pim6reg1 [ 362.200358][T11148] ¯Ê®¸}p: renamed from pim6reg1 [ 362.416947][T11159] device pim6reg1 entered promiscuous mode [ 362.539557][T11155] ¯Ê®¸}p: renamed from pim6reg1 [ 362.690725][T11170] ¯Ê®¸}p: renamed from pim6reg1 [ 362.701394][T11173] device pim6reg1 entered promiscuous mode [ 362.888817][T11186] bridge0: port 2(bridge_slave_1) entered disabled state [ 362.916098][T11186] bridge0: port 1(bridge_slave_0) entered disabled state [ 363.601687][T11197] ¯Ê®¸}p: renamed from pim6reg1 [ 364.421594][T11213] ¯Ê®¸}p: renamed from pim6reg1 [ 364.759388][T11220] device pim6reg1 entered promiscuous mode [ 365.483209][T11231] ¯Ê®¸}p: renamed from pim6reg1 [ 365.505239][T11243] device pim6reg1 entered promiscuous mode [ 366.257382][T11255] ¯Ê®¸}p: renamed from pim6reg1 [ 366.404155][T11259] device pim6reg1 entered promiscuous mode [ 367.499211][T11284] device pim6reg1 entered promiscuous mode [ 367.736057][T11297] ¯Ê®¸}p: renamed from pim6reg1 [ 368.138111][T11317] device pim6reg1 entered promiscuous mode [ 368.187584][T11329] ¯Ê®¸}p: renamed from pim6reg1 [ 368.315880][T11336] device pim6reg1 entered promiscuous mode [ 368.410633][T11346] FAULT_INJECTION: forcing a failure. [ 368.410633][T11346] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 368.451077][T11346] CPU: 0 PID: 11346 Comm: syz.0.3875 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 368.462278][T11346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 368.472172][T11346] Call Trace: [ 368.475307][T11346] [ 368.478075][T11346] dump_stack_lvl+0x151/0x1c0 [ 368.482589][T11346] ? io_uring_drop_tctx_refs+0x190/0x190 [ 368.488055][T11346] ? stack_trace_save+0x113/0x1c0 [ 368.492916][T11346] dump_stack+0x15/0x20 [ 368.496905][T11346] should_fail+0x3c6/0x510 [ 368.501161][T11346] should_fail_alloc_page+0x5a/0x80 [ 368.506192][T11346] prepare_alloc_pages+0x15c/0x700 [ 368.511142][T11346] ? __alloc_pages_bulk+0xe40/0xe40 [ 368.516173][T11346] ? x64_sys_call+0x2f/0x9a0 [ 368.520600][T11346] ? do_syscall_64+0x3b/0xb0 [ 368.525024][T11346] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 368.530929][T11346] __alloc_pages+0x18c/0x8f0 [ 368.535354][T11346] ? prep_new_page+0x110/0x110 [ 368.539958][T11346] kmalloc_order+0x4a/0x160 [ 368.544297][T11346] kmalloc_order_trace+0x1a/0xb0 [ 368.549068][T11346] ? alloc_skb_with_frags+0xa6/0x680 [ 368.554191][T11346] __kmalloc_track_caller+0x19b/0x260 [ 368.559397][T11346] ? kmem_cache_alloc+0xf5/0x200 [ 368.564171][T11346] ? alloc_skb_with_frags+0xa6/0x680 [ 368.569293][T11346] __alloc_skb+0x10c/0x550 [ 368.573548][T11346] alloc_skb_with_frags+0xa6/0x680 [ 368.578492][T11346] ? 0xffffffffa0028000 [ 368.582485][T11346] ? is_bpf_text_address+0x172/0x190 [ 368.587606][T11346] sock_alloc_send_pskb+0x915/0xa50 [ 368.592645][T11346] ? sock_kzfree_s+0x60/0x60 [ 368.597066][T11346] ? stack_trace_save+0x113/0x1c0 [ 368.601925][T11346] ? stack_trace_snprint+0xf0/0xf0 [ 368.606870][T11346] tun_get_user+0xf1b/0x3aa0 [ 368.611295][T11346] ? __x64_sys_openat+0x240/0x290 [ 368.616153][T11346] ? x64_sys_call+0x6bf/0x9a0 [ 368.620667][T11346] ? _kstrtoull+0x3a0/0x4a0 [ 368.625009][T11346] ? tun_do_read+0x2010/0x2010 [ 368.629607][T11346] ? kstrtouint_from_user+0x20a/0x2a0 [ 368.634814][T11346] ? kstrtol_from_user+0x310/0x310 [ 368.639761][T11346] ? bpf_probe_read_compat_str+0x10b/0x180 [ 368.645406][T11346] ? avc_policy_seqno+0x1b/0x70 [ 368.650091][T11346] ? selinux_file_permission+0x2c4/0x570 [ 368.655559][T11346] tun_chr_write_iter+0x1e1/0x2e0 [ 368.660419][T11346] vfs_write+0xd5d/0x1110 [ 368.664587][T11346] ? __traceiter_kmem_cache_free+0x32/0x50 [ 368.670227][T11346] ? file_end_write+0x1c0/0x1c0 [ 368.674915][T11346] ? __fdget_pos+0x209/0x3a0 [ 368.679338][T11346] ? ksys_write+0x77/0x2c0 [ 368.683591][T11346] ksys_write+0x199/0x2c0 [ 368.687768][T11346] ? __ia32_sys_read+0x90/0x90 [ 368.692358][T11346] ? debug_smp_processor_id+0x17/0x20 [ 368.697564][T11346] ? perf_trace_sys_enter+0x30/0x140 [ 368.702686][T11346] __x64_sys_write+0x7b/0x90 [ 368.707116][T11346] x64_sys_call+0x2f/0x9a0 [ 368.711362][T11346] do_syscall_64+0x3b/0xb0 [ 368.715617][T11346] ? clear_bhb_loop+0x35/0x90 [ 368.720130][T11346] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 368.725858][T11346] RIP: 0033:0x7f49ff2d4ef9 [ 368.730114][T11346] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 368.749552][T11346] RSP: 002b:00007f49fdf4f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 368.757796][T11346] RAX: ffffffffffffffda RBX: 00007f49ff48df80 RCX: 00007f49ff2d4ef9 [ 368.765609][T11346] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 368.773418][T11346] RBP: 00007f49fdf4f090 R08: 0000000000000000 R09: 0000000000000000 [ 368.781231][T11346] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 368.789041][T11346] R13: 0000000000000000 R14: 00007f49ff48df80 R15: 00007ffdf5a3c118 [ 368.796868][T11346] [ 369.005925][T11368] device pim6reg1 entered promiscuous mode [ 369.108502][T11363] device veth1_macvtap left promiscuous mode [ 369.140453][T11370] ¯Ê®¸}p: renamed from pim6reg1 [ 369.296933][T11388] syz.0.3891[11388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.297032][T11388] syz.0.3891[11388] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.461448][T11396] syz.4.3894[11396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.485354][T11396] syz.4.3894[11396] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 369.623596][ T100] udevd[100]: worker [10512] terminated by signal 33 (Unknown signal 33) [ 369.653908][T11405] FAULT_INJECTION: forcing a failure. [ 369.653908][T11405] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 369.669392][T11405] CPU: 1 PID: 11405 Comm: syz.2.3898 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 369.680596][T11405] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 369.690491][T11405] Call Trace: [ 369.693613][T11405] [ 369.696387][T11405] dump_stack_lvl+0x151/0x1c0 [ 369.700906][T11405] ? io_uring_drop_tctx_refs+0x190/0x190 [ 369.706372][T11405] ? __kasan_check_write+0x14/0x20 [ 369.711315][T11405] ? __alloc_skb+0x355/0x550 [ 369.715749][T11405] dump_stack+0x15/0x20 [ 369.719735][T11405] should_fail+0x3c6/0x510 [ 369.723989][T11405] should_fail_usercopy+0x1a/0x20 [ 369.728850][T11405] _copy_from_iter+0x22f/0xdc0 [ 369.733451][T11405] ? copy_mc_pipe_to_iter+0x760/0x760 [ 369.738658][T11405] ? __check_object_size+0x2ec/0x3d0 [ 369.743777][T11405] skb_copy_datagram_from_iter+0x100/0x6d0 [ 369.748138][ T100] udevd[100]: worker [10512] failed while handling '/devices/virtual/block/loop0' [ 369.749419][T11405] tun_get_user+0x112d/0x3aa0 [ 369.762958][T11405] ? _kstrtoull+0x3a0/0x4a0 [ 369.767295][T11405] ? tun_do_read+0x2010/0x2010 [ 369.771894][T11405] ? kstrtouint_from_user+0x20a/0x2a0 [ 369.777104][T11405] ? kstrtol_from_user+0x310/0x310 [ 369.782048][T11405] ? bpf_probe_read_compat_str+0x10b/0x180 [ 369.787692][T11405] ? avc_policy_seqno+0x1b/0x70 [ 369.792377][T11405] ? selinux_file_permission+0x2c4/0x570 [ 369.797856][T11405] tun_chr_write_iter+0x1e1/0x2e0 [ 369.802708][T11405] vfs_write+0xd5d/0x1110 [ 369.806873][T11405] ? __traceiter_kmem_cache_free+0x32/0x50 [ 369.812518][T11405] ? file_end_write+0x1c0/0x1c0 [ 369.817202][T11405] ? __fdget_pos+0x209/0x3a0 [ 369.821625][T11405] ? ksys_write+0x77/0x2c0 [ 369.825935][T11405] ksys_write+0x199/0x2c0 [ 369.830046][T11405] ? __ia32_sys_read+0x90/0x90 [ 369.834644][T11405] ? debug_smp_processor_id+0x17/0x20 [ 369.839854][T11405] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 369.845752][T11405] __x64_sys_write+0x7b/0x90 [ 369.850181][T11405] x64_sys_call+0x2f/0x9a0 [ 369.854431][T11405] do_syscall_64+0x3b/0xb0 [ 369.858685][T11405] ? clear_bhb_loop+0x35/0x90 [ 369.863196][T11405] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 369.868927][T11405] RIP: 0033:0x7f1b52dc7ef9 [ 369.873182][T11405] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 369.892718][T11405] RSP: 002b:00007f1b51a42038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 369.900952][T11405] RAX: ffffffffffffffda RBX: 00007f1b52f80f80 RCX: 00007f1b52dc7ef9 [ 369.908763][T11405] RDX: 000000000000fdef RSI: 0000000020000000 RDI: 00000000000000c8 [ 369.916572][T11405] RBP: 00007f1b51a42090 R08: 0000000000000000 R09: 0000000000000000 [ 369.924384][T11405] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 369.932281][T11405] R13: 0000000000000000 R14: 00007f1b52f80f80 R15: 00007ffea5c015b8 [ 369.940100][T11405] [ 369.959138][ T100] udevd[100]: worker [10511] terminated by signal 33 (Unknown signal 33) [ 369.977352][ T100] udevd[100]: worker [10511] failed while handling '/devices/virtual/block/loop2' [ 369.998288][T11396] device pim6reg1 entered promiscuous mode [ 370.007671][T11410] device pim6reg1 entered promiscuous mode [ 370.539509][T11439] FAULT_INJECTION: forcing a failure. [ 370.539509][T11439] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 370.552661][T11439] CPU: 0 PID: 11439 Comm: syz.2.3912 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 370.563840][T11439] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 370.573733][T11439] Call Trace: [ 370.576856][T11439] [ 370.579648][T11439] dump_stack_lvl+0x151/0x1c0 [ 370.584148][T11439] ? io_uring_drop_tctx_refs+0x190/0x190 [ 370.589612][T11439] ? kstrtouint_from_user+0x20a/0x2a0 [ 370.594821][T11439] dump_stack+0x15/0x20 [ 370.598813][T11439] should_fail+0x3c6/0x510 [ 370.603254][T11439] should_fail_usercopy+0x1a/0x20 [ 370.608112][T11439] _copy_to_user+0x20/0x90 [ 370.612366][T11439] simple_read_from_buffer+0xc7/0x150 [ 370.618010][T11439] proc_fail_nth_read+0x1a3/0x210 [ 370.622872][T11439] ? proc_fault_inject_write+0x390/0x390 [ 370.628335][T11439] ? fsnotify_perm+0x470/0x5d0 [ 370.632939][T11439] ? security_file_permission+0x86/0xb0 [ 370.638339][T11439] ? proc_fault_inject_write+0x390/0x390 [ 370.643792][T11439] vfs_read+0x27d/0xd40 [ 370.647781][T11439] ? kernel_read+0x1f0/0x1f0 [ 370.652200][T11439] ? __kasan_check_write+0x14/0x20 [ 370.657151][T11439] ? mutex_lock+0xb6/0x1e0 [ 370.661402][T11439] ? wait_for_completion_killable_timeout+0x10/0x10 [ 370.667832][T11439] ? __fdget_pos+0x2e7/0x3a0 [ 370.672250][T11439] ? ksys_read+0x77/0x2c0 [ 370.676416][T11439] ksys_read+0x199/0x2c0 [ 370.680497][T11439] ? vfs_write+0x1110/0x1110 [ 370.684923][T11439] ? debug_smp_processor_id+0x17/0x20 [ 370.690127][T11439] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 370.696032][T11439] __x64_sys_read+0x7b/0x90 [ 370.700370][T11439] x64_sys_call+0x28/0x9a0 [ 370.704624][T11439] do_syscall_64+0x3b/0xb0 [ 370.708875][T11439] ? clear_bhb_loop+0x35/0x90 [ 370.713387][T11439] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 370.719118][T11439] RIP: 0033:0x7f1b52dc693c [ 370.723369][T11439] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 370.742811][T11439] RSP: 002b:00007f1b51a42030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 370.751055][T11439] RAX: ffffffffffffffda RBX: 00007f1b52f80f80 RCX: 00007f1b52dc693c [ 370.758870][T11439] RDX: 000000000000000f RSI: 00007f1b51a420a0 RDI: 0000000000000006 [ 370.766711][T11439] RBP: 00007f1b51a42090 R08: 0000000000000000 R09: 0000000000000000 [ 370.774489][T11439] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 370.782300][T11439] R13: 0000000000000000 R14: 00007f1b52f80f80 R15: 00007ffea5c015b8 [ 370.790120][T11439] [ 370.812513][T11440] device wg2 entered promiscuous mode [ 370.911554][T11449] syz.0.3913[11449] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 370.911624][T11449] syz.0.3913[11449] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 370.952528][T11448] device pim6reg1 entered promiscuous mode [ 371.445098][T11488] device pim6reg1 entered promiscuous mode [ 372.491242][T11513] ¯Ê®¸}p: renamed from pim6reg1 [ 372.654327][T11531] device pim6reg1 entered promiscuous mode [ 372.979495][T11550] device pim6reg1 entered promiscuous mode [ 372.989528][T11556] ¯Ê®¸}p: renamed from pim6reg1 [ 373.008801][T11558] device pim6reg1 entered promiscuous mode [ 373.633583][T11578] ¯Ê®¸}p: renamed from pim6reg1 [ 373.720908][T11590] syz.1.3967[11590] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 373.720990][T11590] syz.1.3967[11590] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 374.261669][T11604] device pim6reg1 entered promiscuous mode [ 374.280449][T11609] ¯Ê®¸}p: renamed from pim6reg1 [ 375.176608][T11635] ¯Ê®¸}p: renamed from pim6reg1 [ 375.194891][T11641] device pim6reg1 entered promiscuous mode [ 375.992607][T11661] ¯Ê®¸}p: renamed from pim6reg1 [ 376.008188][T11665] device pim6reg1 entered promiscuous mode [ 376.428664][T11687] device pim6reg1 entered promiscuous mode [ 376.616545][T11690] ¯Ê®¸}p: renamed from pim6reg1 [ 379.237515][T11718] ¯Ê®¸}p: renamed from pim6reg1 [ 380.211050][T11743] bridge0: port 3(veth0_to_batadv) entered blocking state [ 380.223091][T11743] bridge0: port 3(veth0_to_batadv) entered disabled state [ 380.234445][T11743] device veth0_to_batadv entered promiscuous mode [ 380.241175][T11743] bridge0: port 3(veth0_to_batadv) entered blocking state [ 380.248216][T11743] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 380.288658][T11753] device pim6reg1 entered promiscuous mode [ 380.303964][T11746] device veth0_to_batadv left promiscuous mode [ 380.315049][T11746] bridge0: port 3(veth0_to_batadv) entered disabled state [ 381.618370][ T30] audit: type=1400 audit(1725618386.344:166): avc: denied { create } for pid=11790 comm="syz.2.4033" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 381.671702][T11778] ¯Ê®¸}p: renamed from pim6reg1 [ 381.870296][T11786] device pim6reg1 entered promiscuous mode [ 382.028430][T11795] device pim6reg1 entered promiscuous mode [ 382.237350][T11800] device pim6reg1 entered promiscuous mode [ 383.760892][T11831] ¯Ê®¸}p: renamed from pim6reg1 [ 383.767235][T11836] device pim6reg1 entered promiscuous mode [ 383.817762][T11838] device pim6reg1 entered promiscuous mode [ 384.197569][T11851] device pim6reg1 entered promiscuous mode [ 384.220156][T11855] syz.1.4054[11855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 384.220247][T11855] syz.1.4054[11855] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 384.565787][T11867] syz.4.4060[11867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 384.594741][T11867] syz.4.4060[11867] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 385.040653][T11873] ¯Ê®¸}p: renamed from pim6reg1 [ 385.487922][T11888] device pim6reg1 entered promiscuous mode [ 385.952271][T11896] device pim6reg1 entered promiscuous mode [ 386.070258][T11894] syz.0.4066[11894] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 386.070354][T11894] syz.0.4066[11894] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 387.440248][T11914] ¯Ê®¸}p: renamed from pim6reg1 [ 387.739834][T11930] device pim6reg1 entered promiscuous mode [ 387.752823][T11926] device pim6reg1 entered promiscuous mode [ 388.104421][T11949] syz.1.4086[11949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.104489][T11949] syz.1.4086[11949] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 388.311271][T11958] ¯Ê®¸}p: renamed from pim6reg1 [ 389.627480][T11969] syz.2.4091[11969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 389.627571][T11969] syz.2.4091[11969] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 390.403778][T11992] device pim6reg1 entered promiscuous mode [ 390.774892][T11998] device pim6reg1 entered promiscuous mode [ 390.797306][T12000] FAULT_INJECTION: forcing a failure. [ 390.797306][T12000] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 390.906381][T12000] CPU: 0 PID: 12000 Comm: syz.4.4104 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 390.917588][T12000] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 390.927479][T12000] Call Trace: [ 390.930601][T12000] [ 390.933379][T12000] dump_stack_lvl+0x151/0x1c0 [ 390.937892][T12000] ? io_uring_drop_tctx_refs+0x190/0x190 [ 390.943360][T12000] ? asm_sysvec_apic_timer_interrupt+0x1b/0x20 [ 390.949351][T12000] dump_stack+0x15/0x20 [ 390.953341][T12000] should_fail+0x3c6/0x510 [ 390.957682][T12000] should_fail_usercopy+0x1a/0x20 [ 390.962540][T12000] _copy_from_user+0x20/0xd0 [ 390.966968][T12000] __tun_chr_ioctl+0x26e/0x2290 [ 390.971657][T12000] ? tun_flow_create+0x320/0x320 [ 390.976429][T12000] ? __fget_files+0x31e/0x380 [ 390.980963][T12000] tun_chr_ioctl+0x2a/0x40 [ 390.985191][T12000] ? tun_chr_poll+0x6d0/0x6d0 [ 390.989706][T12000] __se_sys_ioctl+0x114/0x190 [ 390.994220][T12000] __x64_sys_ioctl+0x7b/0x90 [ 390.998647][T12000] x64_sys_call+0x98/0x9a0 [ 391.002984][T12000] do_syscall_64+0x3b/0xb0 [ 391.007239][T12000] ? clear_bhb_loop+0x35/0x90 [ 391.011749][T12000] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 391.017480][T12000] RIP: 0033:0x7f9ea3555ef9 [ 391.021732][T12000] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 391.041172][T12000] RSP: 002b:00007f9ea21d0038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 391.049415][T12000] RAX: ffffffffffffffda RBX: 00007f9ea370ef80 RCX: 00007f9ea3555ef9 [ 391.057247][T12000] RDX: 0000000020000200 RSI: 00000000400454ca RDI: 0000000000000006 [ 391.065039][T12000] RBP: 00007f9ea21d0090 R08: 0000000000000000 R09: 0000000000000000 [ 391.072852][T12000] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 391.080662][T12000] R13: 0000000000000000 R14: 00007f9ea370ef80 R15: 00007fff2a51b0a8 [ 391.088480][T12000] [ 392.122318][T12025] ¯Ê®¸}p: renamed from pim6reg1 [ 395.565994][T12086] ¯Ê®¸}p: renamed from pim6reg1 [ 397.280194][T12118] ¯Ê®¸}p: renamed from pim6reg1 [ 397.732441][T12126] ¯Ê®¸}p: renamed from pim6reg1 [ 398.889576][T12163] ¯Ê®¸}p: renamed from pim6reg1 [ 399.840696][T12209] syz.3.4175[12209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 399.840777][T12209] syz.3.4175[12209] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 407.657468][T12380] device pim6reg1 entered promiscuous mode [ 409.443359][T12424] device pim6reg1 entered promiscuous mode [ 409.797944][T12436] device pim6reg1 entered promiscuous mode [ 411.172107][T12483] device pim6reg1 entered promiscuous mode [ 412.242911][T12517] device pim6reg1 entered promiscuous mode [ 412.293792][T12524] device pim6reg1 entered promiscuous mode [ 412.742944][T12544] FAULT_INJECTION: forcing a failure. [ 412.742944][T12544] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 412.953605][T12544] CPU: 0 PID: 12544 Comm: syz.3.4277 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 412.964925][T12544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 412.974817][T12544] Call Trace: [ 412.977939][T12544] [ 412.980721][T12544] dump_stack_lvl+0x151/0x1c0 [ 412.985236][T12544] ? io_uring_drop_tctx_refs+0x190/0x190 [ 412.990790][T12544] ? __kasan_check_write+0x14/0x20 [ 412.995735][T12544] dump_stack+0x15/0x20 [ 412.999728][T12544] should_fail+0x3c6/0x510 [ 413.003983][T12544] should_fail_usercopy+0x1a/0x20 [ 413.008842][T12544] _copy_from_user+0x20/0xd0 [ 413.013267][T12544] sock_do_ioctl+0x229/0x5a0 [ 413.017695][T12544] ? sock_show_fdinfo+0xa0/0xa0 [ 413.022382][T12544] ? selinux_file_ioctl+0x3cc/0x540 [ 413.027418][T12544] sock_ioctl+0x455/0x740 [ 413.031576][T12544] ? sock_poll+0x400/0x400 [ 413.035828][T12544] ? __fget_files+0x31e/0x380 [ 413.040342][T12544] ? security_file_ioctl+0x84/0xb0 [ 413.045289][T12544] ? sock_poll+0x400/0x400 [ 413.049540][T12544] __se_sys_ioctl+0x114/0x190 [ 413.054057][T12544] __x64_sys_ioctl+0x7b/0x90 [ 413.058480][T12544] x64_sys_call+0x98/0x9a0 [ 413.062741][T12544] do_syscall_64+0x3b/0xb0 [ 413.066984][T12544] ? clear_bhb_loop+0x35/0x90 [ 413.071499][T12544] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 413.077227][T12544] RIP: 0033:0x7f7a8e3ccef9 [ 413.081485][T12544] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 413.100922][T12544] RSP: 002b:00007f7a8d026038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 413.109166][T12544] RAX: ffffffffffffffda RBX: 00007f7a8e586058 RCX: 00007f7a8e3ccef9 [ 413.116977][T12544] RDX: 0000000020000800 RSI: 0000000000008923 RDI: 0000000000000009 [ 413.124788][T12544] RBP: 00007f7a8d026090 R08: 0000000000000000 R09: 0000000000000000 [ 413.132600][T12544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 413.140410][T12544] R13: 0000000000000000 R14: 00007f7a8e586058 R15: 00007ffd92823cd8 [ 413.148228][T12544] [ 413.887712][T12563] device pim6reg1 entered promiscuous mode [ 414.502636][T12573] device pim6reg1 entered promiscuous mode [ 419.604363][T12598] FAULT_INJECTION: forcing a failure. [ 419.604363][T12598] name failslab, interval 1, probability 0, space 0, times 0 [ 419.673276][T12598] CPU: 1 PID: 12598 Comm: syz.3.4295 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 419.684561][T12598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 419.694464][T12598] Call Trace: [ 419.697582][T12598] [ 419.700360][T12598] dump_stack_lvl+0x151/0x1c0 [ 419.704878][T12598] ? io_uring_drop_tctx_refs+0x190/0x190 [ 419.710347][T12598] ? avc_has_perm_noaudit+0x430/0x430 [ 419.715546][T12598] dump_stack+0x15/0x20 [ 419.719536][T12598] should_fail+0x3c6/0x510 [ 419.723795][T12598] __should_failslab+0xa4/0xe0 [ 419.728390][T12598] should_failslab+0x9/0x20 [ 419.732731][T12598] slab_pre_alloc_hook+0x37/0xd0 [ 419.737503][T12598] ? dev_load+0x5b/0xb0 [ 419.741495][T12598] kmem_cache_alloc_trace+0x48/0x210 [ 419.746622][T12598] ? __request_module+0x28c/0x8e0 [ 419.751477][T12598] ? dev_load+0x5b/0xb0 [ 419.755486][T12598] __request_module+0x28c/0x8e0 [ 419.760160][T12598] ? capable+0x78/0xe0 [ 419.764061][T12598] ? _trace_android_vh_delayacct_thrashing_end+0x120/0x120 [ 419.771094][T12598] ? security_capable+0x87/0xb0 [ 419.775789][T12598] dev_load+0x5b/0xb0 [ 419.779597][T12598] dev_ioctl+0x30f/0xe70 [ 419.783677][T12598] sock_do_ioctl+0x34f/0x5a0 [ 419.788103][T12598] ? sock_show_fdinfo+0xa0/0xa0 [ 419.792794][T12598] ? selinux_file_ioctl+0x3cc/0x540 [ 419.797822][T12598] sock_ioctl+0x455/0x740 [ 419.801988][T12598] ? sock_poll+0x400/0x400 [ 419.806243][T12598] ? __fget_files+0x31e/0x380 [ 419.810756][T12598] ? security_file_ioctl+0x84/0xb0 [ 419.815702][T12598] ? sock_poll+0x400/0x400 [ 419.819953][T12598] __se_sys_ioctl+0x114/0x190 [ 419.824470][T12598] __x64_sys_ioctl+0x7b/0x90 [ 419.828894][T12598] x64_sys_call+0x98/0x9a0 [ 419.833147][T12598] do_syscall_64+0x3b/0xb0 [ 419.837397][T12598] ? clear_bhb_loop+0x35/0x90 [ 419.841913][T12598] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 419.847642][T12598] RIP: 0033:0x7f7a8e3ccef9 [ 419.851982][T12598] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 419.871434][T12598] RSP: 002b:00007f7a8d026038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 419.879664][T12598] RAX: ffffffffffffffda RBX: 00007f7a8e586058 RCX: 00007f7a8e3ccef9 [ 419.887480][T12598] RDX: 0000000020000800 RSI: 0000000000008923 RDI: 0000000000000009 [ 419.895287][T12598] RBP: 00007f7a8d026090 R08: 0000000000000000 R09: 0000000000000000 [ 419.903098][T12598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 419.910910][T12598] R13: 0000000000000000 R14: 00007f7a8e586058 R15: 00007ffd92823cd8 [ 419.918726][T12598] [ 419.943015][ T30] audit: type=1400 audit(1725618424.654:167): avc: denied { sys_module } for pid=12593 comm="syz.3.4295" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 419.970856][T12598] ¯Ê®¸}p: renamed from pim6reg1 [ 419.980079][T12605] device pim6reg1 entered promiscuous mode [ 419.991167][T12600] ¯Ê®¸}p: renamed from pim6reg1 [ 420.141082][T12613] ¯Ê®¸}p: renamed from pim6reg1 [ 422.064930][T12645] ¯Ê®¸}p: renamed from pim6reg1 [ 422.158468][T12645] FAULT_INJECTION: forcing a failure. [ 422.158468][T12645] name failslab, interval 1, probability 0, space 0, times 0 [ 422.232418][T12645] CPU: 1 PID: 12645 Comm: syz.0.4311 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 422.243620][T12645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 422.253514][T12645] Call Trace: [ 422.256638][T12645] [ 422.259421][T12645] dump_stack_lvl+0x151/0x1c0 [ 422.263930][T12645] ? io_uring_drop_tctx_refs+0x190/0x190 [ 422.269398][T12645] ? down_read+0xd50/0x1900 [ 422.273736][T12645] dump_stack+0x15/0x20 [ 422.277733][T12645] should_fail+0x3c6/0x510 [ 422.281983][T12645] __should_failslab+0xa4/0xe0 [ 422.286581][T12645] should_failslab+0x9/0x20 [ 422.290917][T12645] slab_pre_alloc_hook+0x37/0xd0 [ 422.295706][T12645] ? kernfs_rename_ns+0x2c9/0x8b0 [ 422.300554][T12645] __kmalloc_track_caller+0x6c/0x260 [ 422.305673][T12645] ? kernfs_rename_ns+0x2c9/0x8b0 [ 422.310537][T12645] kstrdup_const+0x55/0x90 [ 422.314788][T12645] kernfs_rename_ns+0x2c9/0x8b0 [ 422.319474][T12645] ? up_read+0x5d/0x220 [ 422.323469][T12645] sysfs_rename_link_ns+0x171/0x1b0 [ 422.328501][T12645] device_rename+0x134/0x190 [ 422.332927][T12645] dev_change_name+0x344/0x9c0 [ 422.337532][T12645] ? avc_denied+0x1b0/0x1b0 [ 422.341866][T12645] ? do_sys_openat2+0x71c/0x830 [ 422.346554][T12645] ? dev_alloc_name+0x130/0x130 [ 422.351243][T12645] dev_ifsioc+0x24c/0x10c0 [ 422.355494][T12645] ? dev_ioctl+0xe70/0xe70 [ 422.359830][T12645] ? mutex_lock+0xb6/0x1e0 [ 422.364084][T12645] ? wait_for_completion_killable_timeout+0x10/0x10 [ 422.370517][T12645] ? security_capable+0x87/0xb0 [ 422.375194][T12645] dev_ioctl+0x35c/0xe70 [ 422.379274][T12645] sock_do_ioctl+0x34f/0x5a0 [ 422.383702][T12645] ? sock_show_fdinfo+0xa0/0xa0 [ 422.388388][T12645] ? selinux_file_ioctl+0x3cc/0x540 [ 422.393421][T12645] sock_ioctl+0x455/0x740 [ 422.397587][T12645] ? sock_poll+0x400/0x400 [ 422.401842][T12645] ? __fget_files+0x31e/0x380 [ 422.406352][T12645] ? security_file_ioctl+0x84/0xb0 [ 422.411297][T12645] ? sock_poll+0x400/0x400 [ 422.415552][T12645] __se_sys_ioctl+0x114/0x190 [ 422.420064][T12645] __x64_sys_ioctl+0x7b/0x90 [ 422.424498][T12645] x64_sys_call+0x98/0x9a0 [ 422.428750][T12645] do_syscall_64+0x3b/0xb0 [ 422.432996][T12645] ? clear_bhb_loop+0x35/0x90 [ 422.437511][T12645] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 422.443238][T12645] RIP: 0033:0x7f49ff2d4ef9 [ 422.447497][T12645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 422.466930][T12645] RSP: 002b:00007f49fdf2e038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 422.475174][T12645] RAX: ffffffffffffffda RBX: 00007f49ff48e058 RCX: 00007f49ff2d4ef9 [ 422.482989][T12645] RDX: 0000000020000800 RSI: 0000000000008923 RDI: 0000000000000008 [ 422.490798][T12645] RBP: 00007f49fdf2e090 R08: 0000000000000000 R09: 0000000000000000 [ 422.498610][T12645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 422.506419][T12645] R13: 0000000000000000 R14: 00007f49ff48e058 R15: 00007ffdf5a3c118 [ 422.514238][T12645] [ 422.868616][T12656] ¯Ê®¸}p: renamed from pim6reg1 [ 423.147349][T12671] device pim6reg1 entered promiscuous mode [ 424.443816][T12680] bridge0: port 1(bridge_slave_0) entered blocking state [ 424.614501][T12680] bridge0: port 1(bridge_slave_0) entered disabled state [ 424.621756][T12680] device bridge_slave_0 entered promiscuous mode [ 424.679415][T12680] bridge0: port 2(bridge_slave_1) entered blocking state [ 424.734112][T12680] bridge0: port 2(bridge_slave_1) entered disabled state [ 424.832708][T12680] device bridge_slave_1 entered promiscuous mode [ 424.908534][T12696] ¯Ê®¸}p: renamed from pim6reg1 [ 424.954339][T12696] FAULT_INJECTION: forcing a failure. [ 424.954339][T12696] name failslab, interval 1, probability 0, space 0, times 0 [ 424.979056][T12696] CPU: 1 PID: 12696 Comm: syz.3.4327 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 424.990345][T12696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 425.000240][T12696] Call Trace: [ 425.003362][T12696] [ 425.006140][T12696] dump_stack_lvl+0x151/0x1c0 [ 425.010704][T12696] ? io_uring_drop_tctx_refs+0x190/0x190 [ 425.016121][T12696] dump_stack+0x15/0x20 [ 425.020116][T12696] should_fail+0x3c6/0x510 [ 425.024367][T12696] __should_failslab+0xa4/0xe0 [ 425.028971][T12696] should_failslab+0x9/0x20 [ 425.033303][T12696] slab_pre_alloc_hook+0x37/0xd0 [ 425.038095][T12696] __kmalloc+0x6d/0x270 [ 425.042069][T12696] ? kfree_const+0x39/0x40 [ 425.046320][T12696] ? kobject_get_path+0xbc/0x1f0 [ 425.051103][T12696] ? kfree+0xc8/0x220 [ 425.054913][T12696] kobject_get_path+0xbc/0x1f0 [ 425.059513][T12696] kobject_rename+0x196/0x520 [ 425.064027][T12696] ? kernfs_put+0x4e5/0x520 [ 425.068366][T12696] ? kobject_init_and_add+0x190/0x190 [ 425.073573][T12696] ? sysfs_rename_link_ns+0x17b/0x1b0 [ 425.078781][T12696] device_rename+0x16d/0x190 [ 425.083219][T12696] dev_change_name+0x344/0x9c0 [ 425.087895][T12696] ? avc_denied+0x1b0/0x1b0 [ 425.092241][T12696] ? do_sys_openat2+0x71c/0x830 [ 425.096943][T12696] ? dev_alloc_name+0x130/0x130 [ 425.101612][T12696] dev_ifsioc+0x24c/0x10c0 [ 425.105861][T12696] ? dev_ioctl+0xe70/0xe70 [ 425.110113][T12696] ? mutex_lock+0xb6/0x1e0 [ 425.114375][T12696] ? wait_for_completion_killable_timeout+0x10/0x10 [ 425.120791][T12696] ? security_capable+0x87/0xb0 [ 425.125479][T12696] dev_ioctl+0x35c/0xe70 [ 425.129554][T12696] sock_do_ioctl+0x34f/0x5a0 [ 425.133984][T12696] ? sock_show_fdinfo+0xa0/0xa0 [ 425.138669][T12696] ? selinux_file_ioctl+0x3cc/0x540 [ 425.143701][T12696] sock_ioctl+0x455/0x740 [ 425.147869][T12696] ? sock_poll+0x400/0x400 [ 425.152120][T12696] ? __fget_files+0x31e/0x380 [ 425.156634][T12696] ? security_file_ioctl+0x84/0xb0 [ 425.161578][T12696] ? sock_poll+0x400/0x400 [ 425.165833][T12696] __se_sys_ioctl+0x114/0x190 [ 425.170345][T12696] __x64_sys_ioctl+0x7b/0x90 [ 425.174784][T12696] x64_sys_call+0x98/0x9a0 [ 425.179027][T12696] do_syscall_64+0x3b/0xb0 [ 425.183279][T12696] ? clear_bhb_loop+0x35/0x90 [ 425.187794][T12696] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 425.193520][T12696] RIP: 0033:0x7f7a8e3ccef9 [ 425.197773][T12696] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 425.217308][T12696] RSP: 002b:00007f7a8d026038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 425.225545][T12696] RAX: ffffffffffffffda RBX: 00007f7a8e586058 RCX: 00007f7a8e3ccef9 [ 425.233356][T12696] RDX: 0000000020000800 RSI: 0000000000008923 RDI: 0000000000000009 [ 425.241170][T12696] RBP: 00007f7a8d026090 R08: 0000000000000000 R09: 0000000000000000 [ 425.248985][T12696] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 425.256788][T12696] R13: 0000000000000000 R14: 00007f7a8e586058 R15: 00007ffd92823cd8 [ 425.264609][T12696] [ 425.484985][T12700] ¯Ê®¸}p: renamed from pim6reg1 [ 426.096774][T12715] device pim6reg1 entered promiscuous mode [ 426.215579][ T1122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 426.229570][ T1122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 426.293428][ T1149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 426.314361][ T1149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 426.355021][ T1149] bridge0: port 1(bridge_slave_0) entered blocking state [ 426.361944][ T1149] bridge0: port 1(bridge_slave_0) entered forwarding state [ 426.514296][ T1149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 426.582475][ T1149] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 426.651409][ T1149] bridge0: port 2(bridge_slave_1) entered blocking state [ 426.658295][ T1149] bridge0: port 2(bridge_slave_1) entered forwarding state [ 426.772071][ T1149] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 426.844273][ T1149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 426.922288][ T1149] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 426.992441][ T1149] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 427.015532][T12680] device veth0_vlan entered promiscuous mode [ 427.117450][ T1122] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 427.130884][ T1122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 427.139438][ T1122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 427.147841][ T1122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 427.155854][ T1122] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 427.166783][ T1122] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 427.174392][ T1122] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 427.250063][ T430] device veth0_macvtap left promiscuous mode [ 427.256097][ T430] bridge0: port 3(veth0_macvtap) entered disabled state [ 427.333429][ T430] device bridge_slave_1 left promiscuous mode [ 427.361535][ T430] bridge0: port 2(bridge_slave_1) entered disabled state [ 427.393545][ T430] device bridge_slave_0 left promiscuous mode [ 427.399506][ T430] bridge0: port 1(bridge_slave_0) entered disabled state [ 427.583085][T12749] device pim6reg1 entered promiscuous mode [ 427.589884][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 427.598105][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 427.610026][T12680] device veth1_macvtap entered promiscuous mode [ 427.620437][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 427.628017][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 427.636410][ T26] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 427.655165][ T1122] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 427.668891][ T1122] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 429.126610][T12780] FAULT_INJECTION: forcing a failure. [ 429.126610][T12780] name failslab, interval 1, probability 0, space 0, times 0 [ 429.143979][T12780] CPU: 0 PID: 12780 Comm: syz.4.4354 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 429.155184][T12780] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 429.165075][T12780] Call Trace: [ 429.168197][T12780] [ 429.170976][T12780] dump_stack_lvl+0x151/0x1c0 [ 429.175490][T12780] ? io_uring_drop_tctx_refs+0x190/0x190 [ 429.180960][T12780] ? slab_post_alloc_hook+0x53/0x2c0 [ 429.186078][T12780] ? security_inode_alloc+0x29/0x120 [ 429.191199][T12780] ? inode_init_always+0x76d/0x9d0 [ 429.196142][T12780] ? new_inode_pseudo+0x93/0x220 [ 429.200918][T12780] ? proc_pid_make_inode+0x27/0x1d0 [ 429.205949][T12780] ? proc_pident_instantiate+0x7a/0x2e0 [ 429.211332][T12780] ? proc_pident_lookup+0x1c4/0x260 [ 429.216365][T12780] ? proc_tid_base_lookup+0x2b/0x30 [ 429.221403][T12780] dump_stack+0x15/0x20 [ 429.225392][T12780] should_fail+0x3c6/0x510 [ 429.229646][T12780] __should_failslab+0xa4/0xe0 [ 429.234245][T12780] ? __alloc_skb+0xbe/0x550 [ 429.238588][T12780] should_failslab+0x9/0x20 [ 429.242930][T12780] slab_pre_alloc_hook+0x37/0xd0 [ 429.247697][T12780] ? __alloc_skb+0xbe/0x550 [ 429.252039][T12780] kmem_cache_alloc+0x44/0x200 [ 429.256639][T12780] __alloc_skb+0xbe/0x550 [ 429.260805][T12780] alloc_skb_with_frags+0xa6/0x680 [ 429.265750][T12780] ? memcpy+0x56/0x70 [ 429.269693][T12780] sock_alloc_send_pskb+0x915/0xa50 [ 429.274722][T12780] ? sock_kzfree_s+0x60/0x60 [ 429.279145][T12780] ? __kasan_check_write+0x14/0x20 [ 429.284087][T12780] ? _raw_spin_lock+0xa4/0x1b0 [ 429.288686][T12780] ? _raw_spin_trylock_bh+0x190/0x190 [ 429.293905][T12780] unix_dgram_sendmsg+0x6fd/0x2090 [ 429.298846][T12780] ? unix_dgram_poll+0x710/0x710 [ 429.303616][T12780] ? kasan_set_track+0x5d/0x70 [ 429.308214][T12780] ? kasan_set_track+0x4b/0x70 [ 429.312817][T12780] ? security_socket_sendmsg+0x82/0xb0 [ 429.318110][T12780] ? unix_dgram_poll+0x710/0x710 [ 429.322886][T12780] ____sys_sendmsg+0x59e/0x8f0 [ 429.327486][T12780] ? __sys_sendmsg_sock+0x40/0x40 [ 429.332346][T12780] ? import_iovec+0xe5/0x120 [ 429.336770][T12780] ___sys_sendmsg+0x252/0x2e0 [ 429.341283][T12780] ? __sys_sendmsg+0x260/0x260 [ 429.345898][T12780] ? __fdget+0x1bc/0x240 [ 429.349963][T12780] __se_sys_sendmsg+0x19a/0x260 [ 429.354651][T12780] ? __x64_sys_sendmsg+0x90/0x90 [ 429.359423][T12780] ? ksys_write+0x260/0x2c0 [ 429.363773][T12780] ? debug_smp_processor_id+0x17/0x20 [ 429.368971][T12780] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 429.374871][T12780] __x64_sys_sendmsg+0x7b/0x90 [ 429.379473][T12780] x64_sys_call+0x16a/0x9a0 [ 429.383811][T12780] do_syscall_64+0x3b/0xb0 [ 429.388062][T12780] ? clear_bhb_loop+0x35/0x90 [ 429.392577][T12780] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 429.398391][T12780] RIP: 0033:0x7f9ea3555ef9 [ 429.402649][T12780] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 429.422087][T12780] RSP: 002b:00007f9ea21d0038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 429.430330][T12780] RAX: ffffffffffffffda RBX: 00007f9ea370ef80 RCX: 00007f9ea3555ef9 [ 429.438141][T12780] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000004 [ 429.445955][T12780] RBP: 00007f9ea21d0090 R08: 0000000000000000 R09: 0000000000000000 [ 429.453767][T12780] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 429.461665][T12780] R13: 0000000000000000 R14: 00007f9ea370ef80 R15: 00007fff2a51b0a8 [ 429.469502][T12780] [ 429.723713][T12791] device pim6reg1 entered promiscuous mode [ 430.127899][T12805] ¯Ê®¸}p: renamed from pim6reg1 [ 430.494722][T12833] FAULT_INJECTION: forcing a failure. [ 430.494722][T12833] name failslab, interval 1, probability 0, space 0, times 0 [ 430.626497][T12833] CPU: 0 PID: 12833 Comm: syz.2.4369 Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 430.637703][T12833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 430.647601][T12833] Call Trace: [ 430.650719][T12833] [ 430.653497][T12833] dump_stack_lvl+0x151/0x1c0 [ 430.658008][T12833] ? io_uring_drop_tctx_refs+0x190/0x190 [ 430.663480][T12833] dump_stack+0x15/0x20 [ 430.667466][T12833] should_fail+0x3c6/0x510 [ 430.671721][T12833] __should_failslab+0xa4/0xe0 [ 430.676321][T12833] should_failslab+0x9/0x20 [ 430.680659][T12833] slab_pre_alloc_hook+0x37/0xd0 [ 430.685434][T12833] ? alloc_skb_with_frags+0xa6/0x680 [ 430.690552][T12833] __kmalloc_track_caller+0x6c/0x260 [ 430.695674][T12833] ? alloc_skb_with_frags+0xa6/0x680 [ 430.700793][T12833] ? alloc_skb_with_frags+0xa6/0x680 [ 430.705914][T12833] __alloc_skb+0x10c/0x550 [ 430.710167][T12833] alloc_skb_with_frags+0xa6/0x680 [ 430.715114][T12833] ? memcpy+0x56/0x70 [ 430.718934][T12833] sock_alloc_send_pskb+0x915/0xa50 [ 430.723971][T12833] ? sock_kzfree_s+0x60/0x60 [ 430.728433][T12833] ? __kasan_check_write+0x14/0x20 [ 430.733343][T12833] ? _raw_spin_lock+0xa4/0x1b0 [ 430.737951][T12833] ? _raw_spin_trylock_bh+0x190/0x190 [ 430.743150][T12833] unix_dgram_sendmsg+0x6fd/0x2090 [ 430.748108][T12833] ? unix_dgram_poll+0x710/0x710 [ 430.752870][T12833] ? kasan_set_track+0x5d/0x70 [ 430.757468][T12833] ? kasan_set_track+0x4b/0x70 [ 430.762067][T12833] ? security_socket_sendmsg+0x82/0xb0 [ 430.767363][T12833] ? unix_dgram_poll+0x710/0x710 [ 430.772140][T12833] ____sys_sendmsg+0x59e/0x8f0 [ 430.776740][T12833] ? __sys_sendmsg_sock+0x40/0x40 [ 430.781599][T12833] ? import_iovec+0xe5/0x120 [ 430.786026][T12833] ___sys_sendmsg+0x252/0x2e0 [ 430.790540][T12833] ? __sys_sendmsg+0x260/0x260 [ 430.795144][T12833] ? __fdget+0x1bc/0x240 [ 430.799215][T12833] __se_sys_sendmsg+0x19a/0x260 [ 430.803902][T12833] ? __x64_sys_sendmsg+0x90/0x90 [ 430.808683][T12833] ? ksys_write+0x260/0x2c0 [ 430.813018][T12833] ? debug_smp_processor_id+0x17/0x20 [ 430.818222][T12833] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 430.824126][T12833] __x64_sys_sendmsg+0x7b/0x90 [ 430.828724][T12833] x64_sys_call+0x16a/0x9a0 [ 430.833065][T12833] do_syscall_64+0x3b/0xb0 [ 430.837317][T12833] ? clear_bhb_loop+0x35/0x90 [ 430.841831][T12833] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 430.847560][T12833] RIP: 0033:0x7f1b52dc7ef9 [ 430.851838][T12833] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 430.871252][T12833] RSP: 002b:00007f1b51a42038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 430.879496][T12833] RAX: ffffffffffffffda RBX: 00007f1b52f80f80 RCX: 00007f1b52dc7ef9 [ 430.887308][T12833] RDX: 0000000000000000 RSI: 0000000020000500 RDI: 0000000000000004 [ 430.895118][T12833] RBP: 00007f1b51a42090 R08: 0000000000000000 R09: 0000000000000000 [ 430.902930][T12833] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 430.910742][T12833] R13: 0000000000000000 R14: 00007f1b52f80f80 R15: 00007ffea5c015b8 [ 430.918559][T12833] [ 431.369183][T12841] ¯Ê®¸}p: renamed from pim6reg1 [ 431.380177][T12848] device pim6reg1 entered promiscuous mode [ 442.788258][ T5949] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 442.799807][ T5949] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 442.808047][ T5949] CPU: 0 PID: 5949 Comm: syz-executor Tainted: G W 5.15.157-syzkaller-00897-g53be7c8abe11 #0 [ 442.819327][ T5949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 442.829223][ T5949] RIP: 0010:__rb_erase_color+0x20b/0xa60 [ 442.834688][ T5949] Code: 49 89 de 49 c1 ee 03 43 80 3c 26 00 74 08 48 89 df e8 f9 04 2b ff 4c 8b 3b 4d 89 fc 49 c1 ec 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 04 00 74 08 4c 89 ff e8 d6 04 2b ff 41 f6 07 01 48 89 5d [ 442.854134][ T5949] RSP: 0018:ffffc90000ae79e0 EFLAGS: 00010246 [ 442.860030][ T5949] RAX: dffffc0000000000 RBX: ffff88812418b3e0 RCX: ffff888123218000 [ 442.867970][ T5949] RDX: ffffffff81a57f70 RSI: ffff888109333db8 RDI: ffff88812418b3d0 [ 442.875778][ T5949] RBP: ffffc90000ae7a40 R08: ffffffff81a56030 R09: ffffed10212667bb [ 442.883591][ T5949] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 442.891487][ T5949] R13: ffff88812418b3d0 R14: 1ffff1102483167c R15: 0000000000000000 [ 442.899305][ T5949] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 442.908070][ T5949] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 442.914492][ T5949] CR2: 00007f49fffc0710 CR3: 0000000110b05000 CR4: 00000000003506b0 [ 442.922328][ T5949] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 442.930110][ T5949] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 442.937922][ T5949] Call Trace: [ 442.941057][ T5949] [ 442.943828][ T5949] ? __die_body+0x62/0xb0 [ 442.947991][ T5949] ? die_addr+0x9f/0xd0 [ 442.951983][ T5949] ? exc_general_protection+0x311/0x4b0 [ 442.957368][ T5949] ? asm_exc_general_protection+0x27/0x30 [ 442.962919][ T5949] ? vma_interval_tree_remove+0xae0/0xba0 [ 442.968472][ T5949] ? anon_vma_interval_tree_iter_next+0x390/0x390 [ 442.974724][ T5949] ? __rb_erase_color+0x20b/0xa60 [ 442.979584][ T5949] ? anon_vma_interval_tree_iter_next+0x390/0x390 [ 442.985831][ T5949] ? rwsem_mark_wake+0x770/0x770 [ 442.990606][ T5949] vma_interval_tree_remove+0xb82/0xba0 [ 442.995991][ T5949] ? up_write+0x7d/0x290 [ 443.000066][ T5949] unlink_file_vma+0xd9/0xf0 [ 443.004493][ T5949] free_pgtables+0x13f/0x280 [ 443.008919][ T5949] exit_mmap+0x405/0x940 [ 443.012997][ T5949] ? exit_aio+0x25e/0x3c0 [ 443.017164][ T5949] ? vm_brk+0x30/0x30 [ 443.020982][ T5949] ? mutex_unlock+0xb2/0x260 [ 443.025411][ T5949] ? uprobe_clear_state+0x2cd/0x320 [ 443.030442][ T5949] __mmput+0x95/0x310 [ 443.034260][ T5949] mmput+0x5b/0x170 [ 443.037904][ T5949] do_exit+0xb9c/0x2ca0 [ 443.041899][ T5949] ? __kasan_check_read+0x11/0x20 [ 443.046759][ T5949] ? put_task_struct+0x80/0x80 [ 443.051426][ T5949] ? ksys_write+0x24f/0x2c0 [ 443.055706][ T5949] ? exc_page_fault+0x47a/0x830 [ 443.060383][ T5949] ? __ia32_sys_read+0x90/0x90 [ 443.064985][ T5949] do_group_exit+0x141/0x310 [ 443.069408][ T5949] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 443.075312][ T5949] __x64_sys_exit_group+0x3f/0x40 [ 443.080179][ T5949] x64_sys_call+0x610/0x9a0 [ 443.084511][ T5949] do_syscall_64+0x3b/0xb0 [ 443.088765][ T5949] ? clear_bhb_loop+0x35/0x90 [ 443.093278][ T5949] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 443.099018][ T5949] RIP: 0033:0x7f49ff2d4ef9 [ 443.103258][ T5949] Code: Unable to access opcode bytes at RIP 0x7f49ff2d4ecf. [ 443.110461][ T5949] RSP: 002b:00007ffdf5a3c678 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7 [ 443.118706][ T5949] RAX: ffffffffffffffda RBX: 0000000000000043 RCX: 00007f49ff2d4ef9 [ 443.126518][ T5949] RDX: 00007f49ff2d39a0 RSI: 0000000000000004 RDI: 0000000000000043 [ 443.134330][ T5949] RBP: 00007f49ff48ea38 R08: 00007ffdf5a3a416 R09: 000000000000000c [ 443.142141][ T5949] R10: 000000000000001a R11: 0000000000000246 R12: 000000000000000c [ 443.149953][ T5949] R13: 0000000000000003 R14: 0000000000000009 R15: 0000000000000000 [ 443.157768][ T5949] [ 443.160626][ T5949] Modules linked in: [ 443.389248][ T5949] ---[ end trace d919259c951fb729 ]--- [ 443.448202][ T5949] RIP: 0010:__rb_erase_color+0x20b/0xa60 [ 443.472582][ T5949] Code: 49 89 de 49 c1 ee 03 43 80 3c 26 00 74 08 48 89 df e8 f9 04 2b ff 4c 8b 3b 4d 89 fc 49 c1 ec 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 04 00 74 08 4c 89 ff e8 d6 04 2b ff 41 f6 07 01 48 89 5d [ 443.492381][ T5949] RSP: 0018:ffffc90000ae79e0 EFLAGS: 00010246 [ 443.498333][ T5949] RAX: dffffc0000000000 RBX: ffff88812418b3e0 RCX: ffff888123218000 [ 443.506338][ T5949] RDX: ffffffff81a57f70 RSI: ffff888109333db8 RDI: ffff88812418b3d0 [ 443.514323][ T5949] RBP: ffffc90000ae7a40 R08: ffffffff81a56030 R09: ffffed10212667bb [ 443.522315][ T5949] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 443.530147][ T5949] R13: ffff88812418b3d0 R14: 1ffff1102483167c R15: 0000000000000000 [ 443.538144][ T5949] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 443.547027][ T5949] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 443.553625][ T5949] CR2: 00005555568f04a8 CR3: 000000010fc5c000 CR4: 00000000003506a0 [ 443.561464][ T5949] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 443.569477][ T5949] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000600 [ 443.577470][ T5949] Kernel panic - not syncing: Fatal exception [ 443.583522][ T5949] Kernel Offset: disabled [ 443.587646][ T5949] Rebooting in 86400 seconds..