last executing test programs: 1.861323238s ago: executing program 3 (id=4063): socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, r3}, 0x18) close(r0) 1.860613928s ago: executing program 0 (id=4064): openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000001c0)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f0000000340)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8923, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 1.806466143s ago: executing program 3 (id=4065): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000087b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x40a, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000280), 0x84, r0}, 0x38) 1.110633637s ago: executing program 0 (id=4069): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000800)='kfree_skb\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000002900)="fb6b", 0x2}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xb6) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r3, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) 1.105735307s ago: executing program 3 (id=4071): recvmsg$unix(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000140), 0x6e, &(0x7f0000000280)=[{&(0x7f0000000600)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/146, 0x92}], 0x2, &(0x7f00000002c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xd8}, 0x10000) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x4}]}, @datasec={0x2, 0x1, 0x0, 0xf, 0x3, [{0x3, 0x1, 0x3}], "da6b47"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "f8"}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000000)=""/163, 0x58, 0xa3, 0x1, 0x0, 0x0, @void, @value}, 0x20) 1.091863999s ago: executing program 3 (id=4072): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000d40)={0x0, 0x7000003, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 1.091187599s ago: executing program 0 (id=4073): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000091811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x400, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000964776ff9746c768310000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x4a8800, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)) r6 = perf_event_open$cgroup(&(0x7f00000001c0)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r6, 0x4008240b, &(0x7f00000013c0)) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000007c0)='T', 0x1}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18}, 0x0) 1.000181898s ago: executing program 4 (id=4076): perf_event_open(&(0x7f00000002c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)=ANY=[@ANYBLOB="9feb010018000000000000003c0000003c00000002000000000000000200000408000000000000000300000000000000000000000200000000000000000000000000000200000000000000000000000404"], 0x0, 0x56, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB, @ANYBLOB], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x8, 0x1001, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x9c) (async) bpf$MAP_CREATE(0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400003, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000003280)={0x0, 0x0, 0x0}, 0x0) (async) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x1, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) sendmsg$inet(r1, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) (async) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8fedcb79100a6c52d922ba2a05dd4242"], 0xfdef) (async) close(r5) (async) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) bpf$ENABLE_STATS(0x20, &(0x7f0000000080), 0x4) (async) close(r5) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[], 0xfdef) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffffff, 0x1, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) (async) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000002c0)='kmem_cache_free\x00', r7}, 0x10) 876.769699ms ago: executing program 4 (id=4077): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000087b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"], 0x48) 876.234899ms ago: executing program 1 (id=4078): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x3c, 0x3c, 0x4, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x0, 0x4}]}, @datasec={0x2, 0x1, 0x0, 0xf, 0x3, [{0x3, 0x1, 0x3}], "da6b47"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "f8"}]}, {0x0, [0x0, 0x61]}}, &(0x7f0000000000)=""/163, 0x58, 0xa3, 0x1, 0x0, 0x0, @void, @value}, 0x20) (fail_nth: 1) 629.943252ms ago: executing program 1 (id=4080): openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000001c0)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f0000000340)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8923, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 592.632565ms ago: executing program 1 (id=4081): syz_clone(0x51c4000, 0x0, 0x0, &(0x7f0000001900), 0x0, &(0x7f0000001980)) (fail_nth: 71) 570.217168ms ago: executing program 3 (id=4082): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000087b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x40a, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000280), 0x84, r0}, 0x38) 549.414999ms ago: executing program 4 (id=4083): socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) close(r0) 538.935ms ago: executing program 0 (id=4084): bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000840)={&(0x7f0000000800)='kfree_skb\x00', r0}, 0x10) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)=[{&(0x7f0000002900)="fb6b", 0x2}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000800000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0xb6) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000072"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0}}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r3, &(0x7f0000000080), &(0x7f0000000200)=""/166}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r3, 0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xd, &(0x7f00000002c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}, @call={0x85, 0x0, 0x0, 0x5}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000740)={r3, &(0x7f0000000000), &(0x7f00000000c0)=""/109}, 0x20) 243.255788ms ago: executing program 2 (id=4085): r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.current\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syz_tun\x00', 0x800}) mkdir(&(0x7f0000000080)='./file0\x00', 0x10) ioctl$TUNSETSTEERINGEBPF(r0, 0x800454e0, &(0x7f00000000c0)=r0) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, &(0x7f0000000100)=r0, 0x4) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000140)='memory.current\x00') r1 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f0000000180)=0xffffffffffffffff, 0x4) r2 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000400)=@bpf_tracing={0x1a, 0x19, &(0x7f00000001c0)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x3}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@jmp={0x5, 0x0, 0x7, 0x3, 0x5, 0xffffffffffffffe0, 0x8}, @tail_call={{0x18, 0x2, 0x1, 0x0, r0}}, @jmp={0x5, 0x1, 0x3, 0xd, 0x9, 0x10, 0xfffffffffffffffc}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @map_val={0x18, 0x3, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0xfce}], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f00000002c0)='syzkaller\x00', 0x9, 0xc, &(0x7f0000000300)=""/12, 0x41100, 0xc, '\x00', 0x0, 0x1c, r0, 0x8, &(0x7f0000000340)={0x7, 0x4}, 0x8, 0x10, &(0x7f0000000380)={0x4, 0x1, 0x7c4, 0x1}, 0x10, 0x1c014, r0, 0x3, 0x0, &(0x7f00000003c0)=[{0x2, 0x4, 0x8, 0xc}, {0x2, 0x2, 0xe, 0xa}, {0x4, 0x3, 0x4, 0xa}], 0x10, 0x8, @void, @value}, 0x94) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f00000004c0)={r1, r0, 0x0, r2}, 0x10) r3 = openat$tun(0xffffff9c, &(0x7f0000000500), 0x40000, 0x0) ioctl$TUNGETFILTER(r3, 0x801054db, &(0x7f0000000540)=""/70) write$cgroup_devices(r1, &(0x7f00000005c0)={'c', ' *:* ', 'w\x00'}, 0x8) mkdir(&(0x7f0000000600)='./file0\x00', 0x126) r4 = openat$tun(0xffffff9c, &(0x7f0000000640), 0x400000, 0x0) ioctl$TUNSETLINK(r4, 0x400454cd, 0x3) ioctl$PERF_EVENT_IOC_SET_FILTER(r0, 0x40082406, &(0x7f0000000680)='\\@%\x00') perf_event_open$cgroup(&(0x7f00000006c0)={0x0, 0x80, 0x1e, 0x4, 0x7, 0x5, 0x0, 0xfffffffffffffffa, 0x4200, 0x9, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x2, 0x5}, 0x8000, 0x1, 0x2, 0x4, 0x7, 0x1, 0x904, 0x0, 0x80000001, 0x0, 0x2}, r0, 0x0, r0, 0x1) sendmsg$unix(r0, &(0x7f00000008c0)={&(0x7f0000000740)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000880)=[{&(0x7f00000007c0)="ace7e70a771b062d00b8e4b4cdf2c41c740c1ed099c0d82a0db080a9685034042f93e83cc2b8e8111caa9b7572fbcb43a33f707ca710b9c5f5c39103a99002e21a3f7f986bf4c2407a6dca3f05a9c5fbf438b797835384b885c82f8301982779b3312d036569efd6061fb92e9f4ac9bd2f17af698493a0447c03b796530f2b3c0563e2", 0x83}], 0x1, 0x0, 0x0, 0x40000}, 0x4040) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a80)={r0, 0x20, &(0x7f0000000a40)={&(0x7f0000000900)=""/78, 0x4e, 0x0, &(0x7f0000000980)=""/132, 0x84}}, 0x10) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000b00)={0x4, &(0x7f0000000ac0)=[{0x7fff, 0x59, 0x8, 0x8}, {0x3, 0x0, 0x3, 0x7}, {0xa, 0x8, 0x5, 0xfffffffb}, {0x1, 0x1, 0x46, 0x2}]}) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000b40)={0xffffffffffffffff}, 0x4) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x4) write$cgroup_subtree(r0, &(0x7f0000000b80)={[{0x2b, 'pids'}, {0x2b, 'cpu'}, {0x2b, 'freezer'}, {0x2b, 'io'}]}, 0x18) ioctl$TUNSETNOCSUM(r3, 0x400454c8, 0x1) unlink(&(0x7f0000000bc0)='./file0\x00') r5 = gettid() bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000c40)={r5, r0, 0x0, 0x2, &(0x7f0000000c00)='w\x00'}, 0x30) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000e40)={r0, 0x58, &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000fc0)=@bpf_tracing={0x1a, 0x9, &(0x7f0000000c80)=@raw=[@alu={0x4, 0x0, 0x1, 0x9, 0xb, 0x4, 0x8}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @initr0={0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xa}, @btf_id={0x18, 0x4, 0x3, 0x0, 0x4}, @call={0x85, 0x0, 0x0, 0xbd}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @alu={0x7, 0x1, 0xd, 0xb, 0x5, 0x40, 0x10}], &(0x7f0000000d00)='syzkaller\x00', 0x10001, 0x64, &(0x7f0000000d40)=""/100, 0x41000, 0x0, '\x00', r6, 0x1a, r0, 0x8, &(0x7f0000000e80)={0x8, 0x1}, 0x8, 0x10, &(0x7f0000000ec0)={0x0, 0x0, 0x7ff, 0x5}, 0x10, 0x2f1d7, r0, 0xa, 0x0, &(0x7f0000000f00)=[{0x5, 0x2, 0xc, 0x2}, {0x5, 0x2, 0x3, 0x9}, {0x2, 0x3, 0x1, 0x3}, {0x2, 0x5, 0x6, 0xe}, {0x3, 0x5, 0xa, 0xa}, {0x0, 0x3, 0xc, 0x3}, {0x3, 0x4, 0x7, 0x4}, {0x2, 0x1, 0x3, 0x5}, {0x3, 0x3, 0x7, 0x5}, {0x1, 0x4, 0x4, 0x9}], 0x10, 0x1, @void, @value}, 0x94) close(r0) 242.667538ms ago: executing program 4 (id=4086): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000e56520207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000540)='task_rename\x00', r2}, 0x11) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r3}, &(0x7f0000000080), &(0x7f0000000240)=r2}, 0x20) 231.688039ms ago: executing program 3 (id=4087): socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000005c0)=""/76, 0x4c}], 0x1}, 0x40fd) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff00000000000000", @ANYRES32=0x1, @ANYBLOB="00000000008816d2", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r5, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r4, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r5, 0x1, 0x35, &(0x7f0000000040)=r6, 0x4) openat$cgroup_ro(r6, &(0x7f00000002c0)='cpu.stat\x00', 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000209336a497dee2f0a900000000040000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r8}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r9}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r11, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x0) recvmsg$unix(r10, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffdc8}, 0x0) r12 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x18, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b70800007b8af0ff00000000bf8100000800000007080000f8ffffffbfa400000000000007040000f0ffffffb7020000080000001823000000000000", @ANYRES32=r12, @ANYBLOB="0000000002000000b70500000800000085000000a50000009500000000000000"], &(0x7f0000000300)='GPL\x00', 0x5, 0x1011, &(0x7f00000016c0)=""/4113, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x22) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff}) recvmsg$unix(r13, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r14, &(0x7f0000000000)=ANY=[], 0xfdef) r15 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x40, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='fsi_master_break\x00', r15, 0x0, 0x36802399}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r15}, 0x10) 229.271439ms ago: executing program 4 (id=4088): socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) close(r0) 214.01351ms ago: executing program 2 (id=4089): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x900, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xa, 0x8, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8c18cffb703000008000000b704000000000000850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000240)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x3, [@var={0xa, 0x0, 0x0, 0xe, 0x1, 0x1}, @int={0x7, 0x0, 0x0, 0x1, 0x0, 0x25, 0x0, 0x29, 0x1}]}, {0x0, [0x30]}}, &(0x7f0000000180)=""/165, 0x3b, 0xa5, 0x1, 0x5, 0x0, @void, @value}, 0x28) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='timer_start\x00', r2}, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) 213.33888ms ago: executing program 1 (id=4090): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000003c0)={{r0, 0xffffffffffffffff}, &(0x7f00000000c0), &(0x7f00000002c0)='%ps \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000280)='percpu_alloc_percpu\x00', r2}, 0x10) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x66, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x58}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'macsec0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x5, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, [@call={0x85, 0x0, 0x0, 0x17}, @call={0x85, 0x0, 0x0, 0x7}]}, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) openat$cgroup_root(0xffffff9c, &(0x7f0000000140)='./cgroup.net/syz1\x00', 0x200002, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'macsec0\x00', 0xca58c30f81b6079f}) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x8914, &(0x7f0000000080)) 212.87475ms ago: executing program 0 (id=4091): openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.procs\x00', 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000700)={&(0x7f00000001c0)='kmem_cache_free\x00', r1}, 0x10) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(0xffffffffffffffff) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb7910009875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00000000000000000000000000ac1414aa"], 0xfdef) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = bpf$ITER_CREATE(0x21, &(0x7f0000000300), 0x8) ioctl$TUNGETFEATURES(r4, 0x800454cf, &(0x7f0000000340)) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000000)={'veth0_vlan\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r5, 0x8923, &(0x7f0000000000)={'vlan0\x00', @broadcast}) 212.26857ms ago: executing program 2 (id=4092): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=@base={0xb, 0x5, 0x400, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r0, &(0x7f0000000340), &(0x7f00000005c0)=""/155}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) close(r1) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0xb, 0x7, 0x10001, 0x8, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) close(r1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000d40)={0x0, 0x7000003, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 198.632482ms ago: executing program 2 (id=4093): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000087b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r1}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"], 0x48) 190.961162ms ago: executing program 4 (id=4094): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0x0, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000091811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x400, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000964776ff9746c768310000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) openat$tun(0xffffffffffffff9c, &(0x7f0000000180), 0x4a8800, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)) r6 = perf_event_open$cgroup(&(0x7f00000001c0)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ID(r6, 0x4008240b, &(0x7f00000013c0)) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000a80)=[{&(0x7f00000007c0)='T', 0x1}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18}, 0x0) 174.668934ms ago: executing program 2 (id=4095): bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020641700000000002020007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r0}, 0x18) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, &(0x7f0000000180), &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x53, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_CREATE(0x0, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) write$cgroup_pid(r2, &(0x7f0000000000), 0x2a979d) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008f50850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000008000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400, @void, @value}, 0x94) openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r4, 0x8914, &(0x7f0000000100)={'pim6reg1\x00', @broadcast}) 78.046053ms ago: executing program 0 (id=4096): socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000040)="fb6bba8839fe8bc048c0cdafd1f8a9918bc4055eaaeb6db4ee9bcb25b1811dbf40b3a7da5a8a64db04ed6dd26eea2e37229c339b1f91201c2796173864", 0x3d}], 0x1}, 0x0) recvmsg(r0, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)=""/60, 0x3c}], 0x1}, 0x40fd) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) close(r0) (fail_nth: 1) 12.321999ms ago: executing program 2 (id=4097): bpf$PROG_BIND_MAP(0xa, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r2}, 0x10) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) 11.626929ms ago: executing program 1 (id=4098): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='task_rename\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000e56520207b1af8ff00000000bfa100000000000007010000f8ffffffb702000001000000b703000000000000850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000540)='task_rename\x00', r2}, 0x11) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r3}, &(0x7f0000000080), &(0x7f0000000240)=r2}, 0x20) 0s ago: executing program 1 (id=4099): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xda00) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000e00)) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000087b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000e27b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x6, 0x5, 0x1000, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r3}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000200"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000400)}, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x40a, 0x0, 0xfffffffffffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180), &(0x7f0000000280), 0x84, r0}, 0x38) kernel console output (not intermixed with test programs): te_user helper that may corrupt user memory! [ 324.980788][ T9779] syz.4.2936[9779] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 325.985239][ T9794] device syzkaller0 entered promiscuous mode [ 326.228621][ T9820] bond_slave_1: mtu less than device minimum [ 326.235643][ T9822] syz.0.2955[9822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 326.235719][ T9822] syz.0.2955[9822] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 328.616712][ T9888] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.635425][ T9888] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.642895][ T9888] device bridge_slave_0 entered promiscuous mode [ 328.652772][ T9888] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.660371][ T9888] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.667827][ T9888] device bridge_slave_1 entered promiscuous mode [ 328.707143][ T9888] bridge0: port 2(bridge_slave_1) entered blocking state [ 328.714002][ T9888] bridge0: port 2(bridge_slave_1) entered forwarding state [ 328.721274][ T9888] bridge0: port 1(bridge_slave_0) entered blocking state [ 328.728227][ T9888] bridge0: port 1(bridge_slave_0) entered forwarding state [ 328.748986][ T45] device bridge_slave_1 left promiscuous mode [ 328.755452][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 328.762735][ T45] device bridge_slave_0 left promiscuous mode [ 328.768824][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 328.776624][ T45] device veth1_macvtap left promiscuous mode [ 328.782552][ T45] device veth0_vlan left promiscuous mode [ 328.967116][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 328.974874][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 328.983461][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 328.993274][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 329.001188][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 329.015407][ T6645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 329.026819][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 329.034710][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 329.042826][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 329.051535][ T9888] device veth0_vlan entered promiscuous mode [ 329.061931][ T6645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 329.072026][ T9888] device veth1_macvtap entered promiscuous mode [ 329.081494][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 329.095667][ T6645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 329.364434][ T9895] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.372048][ T9895] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.379432][ T9895] device bridge_slave_0 entered promiscuous mode [ 329.388119][ T9895] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.395172][ T9895] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.402730][ T9895] device bridge_slave_1 entered promiscuous mode [ 329.448700][ T9896] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.456372][ T9896] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.464164][ T9896] device bridge_slave_0 entered promiscuous mode [ 329.483365][ T9896] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.491090][ T9896] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.499842][ T9896] device bridge_slave_1 entered promiscuous mode [ 329.585753][ T9895] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.592723][ T9895] bridge0: port 2(bridge_slave_1) entered forwarding state [ 329.600120][ T9895] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.607123][ T9895] bridge0: port 1(bridge_slave_0) entered forwarding state [ 329.628322][ T9896] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.635182][ T9896] bridge0: port 2(bridge_slave_1) entered forwarding state [ 329.642312][ T9896] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.649078][ T9896] bridge0: port 1(bridge_slave_0) entered forwarding state [ 329.678068][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 329.685767][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.693280][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.700597][ T6] bridge0: port 1(bridge_slave_0) entered disabled state [ 329.707930][ T6] bridge0: port 2(bridge_slave_1) entered disabled state [ 329.728130][ T6645] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 329.736080][ T6645] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.743125][ T6645] bridge0: port 1(bridge_slave_0) entered forwarding state [ 329.750596][ T6645] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 329.758844][ T6645] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.765679][ T6645] bridge0: port 2(bridge_slave_1) entered forwarding state [ 329.772919][ T6645] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 329.780730][ T6645] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 329.798330][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 329.805972][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 329.815015][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 329.823051][ T2190] bridge0: port 1(bridge_slave_0) entered blocking state [ 329.829908][ T2190] bridge0: port 1(bridge_slave_0) entered forwarding state [ 329.837345][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 329.845442][ T2190] bridge0: port 2(bridge_slave_1) entered blocking state [ 329.852760][ T2190] bridge0: port 2(bridge_slave_1) entered forwarding state [ 329.865228][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 329.873701][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 329.905666][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 329.936352][ T9895] device veth0_vlan entered promiscuous mode [ 329.945502][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 330.063539][ T30] audit: type=1400 audit(1727839325.262:178): avc: denied { write } for pid=9911 comm="syz.0.2983" name="cgroup.subtree_control" dev="cgroup2" ino=430 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 330.090526][ T30] audit: type=1400 audit(1727839325.272:179): avc: denied { open } for pid=9911 comm="syz.0.2983" path="" dev="cgroup2" ino=430 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 330.090929][ T9895] device veth1_macvtap entered promiscuous mode [ 330.180336][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 330.189475][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 330.201307][ T45] device bridge_slave_1 left promiscuous mode [ 330.207749][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.215252][ T45] device bridge_slave_0 left promiscuous mode [ 330.221823][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.230681][ T45] device veth1_macvtap left promiscuous mode [ 330.236810][ T45] device veth0_vlan left promiscuous mode [ 330.415847][ T9896] device veth0_vlan entered promiscuous mode [ 330.425080][ T6645] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 330.457502][ T6645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 330.465845][ T6645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 330.474786][ T6645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 330.483699][ T6645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 330.491817][ T6645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 330.509817][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 330.517725][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 330.525069][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 330.533938][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 330.552409][ T9896] device veth1_macvtap entered promiscuous mode [ 330.573053][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 330.589392][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 330.605953][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 330.707098][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 330.715741][ T315] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 330.756754][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 330.770739][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 330.803579][ T9913] bridge0: port 1(bridge_slave_0) entered blocking state [ 330.832130][ T9913] bridge0: port 1(bridge_slave_0) entered disabled state [ 330.839901][ T9913] device bridge_slave_0 entered promiscuous mode [ 330.847837][ T9913] bridge0: port 2(bridge_slave_1) entered blocking state [ 330.855670][ T9913] bridge0: port 2(bridge_slave_1) entered disabled state [ 330.864011][ T9913] device bridge_slave_1 entered promiscuous mode [ 330.935442][ T9935] syz.0.2988[9935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 330.935532][ T9935] syz.0.2988[9935] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 331.944279][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 332.050588][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 332.123386][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 332.155391][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 332.329495][ T20] bridge0: port 1(bridge_slave_0) entered blocking state [ 332.336539][ T20] bridge0: port 1(bridge_slave_0) entered forwarding state [ 332.490342][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 332.551498][ T20] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 332.713558][ T20] bridge0: port 2(bridge_slave_1) entered blocking state [ 332.720547][ T20] bridge0: port 2(bridge_slave_1) entered forwarding state [ 332.883016][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 332.890880][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 332.899131][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 332.907537][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 332.915721][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 332.930622][ T9913] device veth0_vlan entered promiscuous mode [ 333.011283][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 333.033679][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 333.044456][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 333.052896][ T6] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 333.063275][ T9973] device bridge_slave_1 left promiscuous mode [ 333.069770][ T9973] bridge0: port 2(bridge_slave_1) entered disabled state [ 333.077782][ T9973] device bridge_slave_0 left promiscuous mode [ 333.084108][ T9973] bridge0: port 1(bridge_slave_0) entered disabled state [ 333.118950][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 333.126500][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 333.175452][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 333.184354][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 333.195662][ T9913] device veth1_macvtap entered promiscuous mode [ 333.296847][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 333.322974][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 333.348500][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 333.362237][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 333.371599][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 334.623893][T10033] device pim6reg1 entered promiscuous mode [ 334.868036][T10042] device sit0 entered promiscuous mode [ 336.348028][T10107] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 336.642309][T10107] device syzkaller0 entered promiscuous mode [ 337.003838][T10127] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.010913][T10127] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.128427][T10127] device bridge_slave_1 left promiscuous mode [ 337.158455][T10127] bridge0: port 2(bridge_slave_1) entered disabled state [ 337.172593][T10127] device bridge_slave_0 left promiscuous mode [ 337.179192][T10127] bridge0: port 1(bridge_slave_0) entered disabled state [ 337.481631][T10141] device syzkaller0 entered promiscuous mode [ 338.356581][T10164] device pim6reg1 entered promiscuous mode [ 340.718647][T10218] device pim6reg1 entered promiscuous mode [ 340.808436][T10220] device pim6reg1 entered promiscuous mode [ 342.044325][T10256] device veth0_vlan left promiscuous mode [ 342.229297][T10266] syz.1.3107[10266] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.229377][T10266] syz.1.3107[10266] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 342.428602][T10256] device veth0_vlan entered promiscuous mode [ 343.910918][T10307] device pim6reg1 entered promiscuous mode [ 344.776577][T10331] device syzkaller0 entered promiscuous mode [ 348.049865][T10443] device syzkaller0 entered promiscuous mode [ 348.590466][T10468] device sit0 left promiscuous mode [ 348.812201][T10474] device sit0 entered promiscuous mode [ 349.401834][T10495] bond_slave_1: mtu less than device minimum [ 349.493050][ T30] audit: type=1400 audit(1727839344.692:180): avc: denied { create } for pid=10496 comm="syz.4.3194" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=isdn_socket permissive=1 [ 353.530393][T10593] syz.2.3224[10593] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 353.700813][T10596] bond_slave_1: mtu less than device minimum [ 353.814187][T10607] device veth1_macvtap left promiscuous mode [ 354.073202][T10621] ------------[ cut here ]------------ [ 354.164822][T10618] device veth0_vlan left promiscuous mode [ 354.177564][T10621] trace type BPF program uses run-time allocation [ 354.345942][T10621] WARNING: CPU: 0 PID: 10621 at kernel/bpf/verifier.c:11689 check_map_prog_compatibility+0x6f1/0x890 [ 354.489049][T10621] Modules linked in: [ 354.492793][T10621] CPU: 1 PID: 10621 Comm: syz.3.3235 Not tainted 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 354.493338][T10618] device veth0_vlan entered promiscuous mode [ 354.538842][T10621] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 354.761207][T10621] RIP: 0010:check_map_prog_compatibility+0x6f1/0x890 [ 354.768089][T10621] Code: db e9 f9 fc ff ff e8 1e 33 ed ff 31 db e9 ed fc ff ff e8 12 33 ed ff c6 05 1d 3c a3 05 01 48 c7 c7 c0 e1 87 85 e8 4f 70 be ff <0f> 0b e9 5a fb ff ff 89 d9 80 e1 07 80 c1 03 38 c1 0f 8c 84 f9 ff [ 354.846501][T10621] RSP: 0018:ffffc90000b7f328 EFLAGS: 00010246 [ 354.852761][T10632] device veth0_vlan left promiscuous mode [ 354.854745][T10621] RAX: db3b8b0f5bbff100 RBX: 0000000000000001 RCX: 0000000000040000 [ 354.868609][T10621] RDX: ffffc900014fc000 RSI: 0000000000000996 RDI: 0000000000000997 [ 354.984561][T10632] device veth0_vlan entered promiscuous mode [ 354.997014][T10621] RBP: ffffc90000b7f370 R08: ffffffff81578a05 R09: ffffed103ee065e8 [ 355.064626][T10621] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000011 [ 355.208036][T10621] R13: ffff88811832a000 R14: ffffc9000011c000 R15: dffffc0000000000 [ 355.237843][T10621] FS: 00007f4fbb12b6c0(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 355.252949][T10621] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 355.273548][T10621] CR2: 0000000000000000 CR3: 00000001246eb000 CR4: 00000000003506b0 [ 355.288737][T10621] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 355.296848][T10621] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 355.319726][T10621] Call Trace: [ 355.323359][T10621] [ 355.326221][T10621] ? show_regs+0x58/0x60 [ 355.330909][T10621] ? __warn+0x160/0x2f0 [ 355.335071][T10621] ? check_map_prog_compatibility+0x6f1/0x890 [ 355.341409][T10621] ? report_bug+0x3d9/0x5b0 [ 355.351245][T10621] ? check_map_prog_compatibility+0x6f1/0x890 [ 355.358638][T10621] ? handle_bug+0x41/0x70 [ 355.363658][T10621] ? exc_invalid_op+0x1b/0x50 [ 355.368993][T10621] ? asm_exc_invalid_op+0x1b/0x20 [ 355.374041][T10621] ? __wake_up_klogd+0xd5/0x110 [ 355.401580][T10621] ? check_map_prog_compatibility+0x6f1/0x890 [ 355.434161][T10621] ? check_map_prog_compatibility+0x6f1/0x890 [ 355.445720][T10621] resolve_pseudo_ldimm64+0x682/0x1240 [ 355.458194][T10621] ? check_attach_btf_id+0xef0/0xef0 [ 355.469905][T10621] ? __mark_reg_known+0x1b0/0x1b0 [ 355.479601][T10621] ? security_capable+0x87/0xb0 [ 355.484388][T10621] bpf_check+0x3174/0x12bf0 [ 355.488851][T10621] ? 0xffffffffa0028000 [ 355.492924][T10621] ? is_bpf_text_address+0x172/0x190 [ 355.498101][T10621] ? stack_trace_save+0x1c0/0x1c0 [ 355.502986][T10621] ? __kernel_text_address+0x9b/0x110 [ 355.511596][T10621] ? unwind_get_return_address+0x4d/0x90 [ 355.518403][T10621] ? bpf_get_btf_vmlinux+0x60/0x60 [ 355.523360][T10621] ? arch_stack_walk+0xf3/0x140 [ 355.529370][T10621] ? stack_trace_save+0x113/0x1c0 [ 355.534245][T10621] ? stack_trace_snprint+0xf0/0xf0 [ 355.539212][T10621] ? stack_trace_snprint+0xf0/0xf0 [ 355.544974][T10621] ? __stack_depot_save+0x34/0x470 [ 355.623783][T10621] ? ____kasan_kmalloc+0xed/0x110 [ 355.665913][T10621] ? ____kasan_kmalloc+0xdb/0x110 [ 355.703695][T10621] ? __kasan_kmalloc+0x9/0x10 [ 355.762301][T10621] ? kmem_cache_alloc_trace+0x115/0x210 [ 355.792861][T10621] ? selinux_bpf_prog_alloc+0x51/0x140 [ 355.844581][T10621] ? security_bpf_prog_alloc+0x62/0x90 [ 355.898993][T10621] ? bpf_prog_load+0x9ee/0x1b50 [ 355.927714][T10621] ? __sys_bpf+0x4bc/0x760 [ 355.955479][T10621] ? __x64_sys_bpf+0x7c/0x90 [ 355.968250][T10621] ? x64_sys_call+0x87f/0x9a0 [ 356.044477][T10621] ? do_syscall_64+0x3b/0xb0 [ 356.095002][T10621] ? entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 356.154817][T10621] ? __kasan_kmalloc+0x9/0x10 [ 356.211959][T10621] ? memset+0x35/0x40 [ 356.239147][T10621] ? bpf_obj_name_cpy+0x196/0x1e0 [ 356.244047][T10621] bpf_prog_load+0x12ac/0x1b50 [ 356.248727][T10621] ? map_freeze+0x370/0x370 [ 356.260790][T10621] ? selinux_bpf+0xcb/0x100 [ 356.296993][T10621] ? security_bpf+0x82/0xb0 [ 356.303141][T10621] __sys_bpf+0x4bc/0x760 [ 356.351142][T10621] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 356.485470][T10621] ? __kasan_check_read+0x11/0x20 [ 356.583675][T10621] __x64_sys_bpf+0x7c/0x90 [ 356.709647][T10621] x64_sys_call+0x87f/0x9a0 [ 356.714138][T10621] do_syscall_64+0x3b/0xb0 [ 356.740451][T10621] ? clear_bhb_loop+0x35/0x90 [ 356.781379][T10621] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 356.795240][T10621] RIP: 0033:0x7f4fbc4b1ff9 [ 356.801109][T10621] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 356.841532][T10621] RSP: 002b:00007f4fbb12b038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 356.850706][T10621] RAX: ffffffffffffffda RBX: 00007f4fbc669f80 RCX: 00007f4fbc4b1ff9 [ 356.925607][T10621] RDX: 0000000000000090 RSI: 00000000200000c0 RDI: 0000000000000005 [ 356.953484][T10621] RBP: 00007f4fbc524296 R08: 0000000000000000 R09: 0000000000000000 [ 357.006186][T10621] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 357.050694][T10621] R13: 0000000000000000 R14: 00007f4fbc669f80 R15: 00007ffe204bd178 [ 357.117842][T10621] [ 357.120705][T10621] ---[ end trace bcdc3422ec235e48 ]--- [ 358.254246][T10746] device sit0 entered promiscuous mode [ 362.780980][T10872] device syzkaller0 entered promiscuous mode [ 363.742121][T10907] syz.2.3338[10907] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.742226][T10907] syz.2.3338[10907] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 363.989037][T10925] device syzkaller0 entered promiscuous mode [ 365.517811][ T45] device veth1_macvtap left promiscuous mode [ 365.524120][ T45] device veth0_vlan left promiscuous mode [ 365.558953][ T9895] syz-executor (9895) used greatest stack depth: 20752 bytes left [ 366.789314][ T45] device bridge_slave_1 left promiscuous mode [ 366.795359][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.802833][ T45] device bridge_slave_0 left promiscuous mode [ 366.808813][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.816310][ T45] device bridge_slave_1 left promiscuous mode [ 366.822315][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.829510][ T45] device bridge_slave_0 left promiscuous mode [ 366.835847][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.843787][ T45] device bridge_slave_1 left promiscuous mode [ 366.850026][ T45] bridge0: port 2(bridge_slave_1) entered disabled state [ 366.857372][ T45] device bridge_slave_0 left promiscuous mode [ 366.863545][ T45] bridge0: port 1(bridge_slave_0) entered disabled state [ 366.871686][ T45] device veth1_macvtap left promiscuous mode [ 366.877764][ T45] device veth0_vlan left promiscuous mode [ 366.883711][ T45] device veth1_macvtap left promiscuous mode [ 366.889560][ T45] device veth0_vlan left promiscuous mode [ 367.170946][T10975] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.178284][T10975] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.185412][T10975] device bridge_slave_0 entered promiscuous mode [ 367.192328][T10975] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.199181][T10975] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.206354][T10975] device bridge_slave_1 entered promiscuous mode [ 367.248148][T10975] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.254998][T10975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 367.262371][T10975] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.269403][T10975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.288212][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 367.295734][ T42] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.303010][ T42] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.318367][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 367.326307][ T2190] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.333157][ T2190] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.340314][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 367.348716][ T2190] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.355621][ T2190] bridge0: port 2(bridge_slave_1) entered forwarding state [ 367.362875][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 367.370667][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 367.384935][T10975] device veth0_vlan entered promiscuous mode [ 367.391699][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 367.400306][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 367.408148][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 367.415423][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 367.427389][T10975] device veth1_macvtap entered promiscuous mode [ 367.440380][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 367.448801][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 367.468152][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 367.547088][T10984] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.553946][T10984] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.561265][T10984] device bridge_slave_0 entered promiscuous mode [ 367.568040][T10984] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.574872][T10984] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.582210][T10984] device bridge_slave_1 entered promiscuous mode [ 367.625623][T10985] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.632930][T10985] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.640284][T10985] device bridge_slave_0 entered promiscuous mode [ 367.647288][T10985] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.654123][T10985] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.661475][T10985] device bridge_slave_1 entered promiscuous mode [ 367.770453][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 367.777909][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 367.789626][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 367.797865][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 367.805827][ T60] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.812689][ T60] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.819913][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 367.827216][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 367.834399][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 367.842628][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 367.850601][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.857436][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 367.871530][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 367.878976][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 367.887133][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 367.895146][ T311] bridge0: port 1(bridge_slave_0) entered blocking state [ 367.901994][ T311] bridge0: port 1(bridge_slave_0) entered forwarding state [ 367.909382][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 367.917660][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 367.926111][ T311] bridge0: port 2(bridge_slave_1) entered blocking state [ 367.933274][ T311] bridge0: port 2(bridge_slave_1) entered forwarding state [ 367.940424][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 367.948488][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 367.956688][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 367.965754][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 367.986679][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 368.056813][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 368.087581][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 368.136878][T10985] device veth0_vlan entered promiscuous mode [ 368.167586][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 368.175856][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 368.184186][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 368.191879][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 368.216528][T10984] device veth0_vlan entered promiscuous mode [ 368.241129][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 368.250460][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 368.285148][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 368.292810][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 368.300824][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 368.309550][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 368.327715][T10985] device veth1_macvtap entered promiscuous mode [ 368.342378][T11006] bridge0: port 3(veth0_to_batadv) entered blocking state [ 368.352447][T11006] bridge0: port 3(veth0_to_batadv) entered disabled state [ 368.362161][T11006] device veth0_to_batadv entered promiscuous mode [ 368.369711][T11006] bridge0: port 3(veth0_to_batadv) entered blocking state [ 368.376689][T11006] bridge0: port 3(veth0_to_batadv) entered forwarding state [ 368.390381][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 368.399664][T10984] device veth1_macvtap entered promiscuous mode [ 368.430138][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 368.454402][ T311] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 368.481921][T10998] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.488871][T10998] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.496088][T10998] device bridge_slave_0 entered promiscuous mode [ 368.504906][T10998] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.512818][T10998] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.520161][T10998] device bridge_slave_1 entered promiscuous mode [ 368.526732][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 368.535788][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 368.544632][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 368.552984][T11016] bond_slave_1: mtu less than device minimum [ 368.570916][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 368.579196][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 368.582296][T11020] syz.0.3371[11020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 368.587268][T11020] syz.0.3371[11020] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 370.694400][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 370.716544][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 370.724120][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 370.756633][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 370.766763][ T2190] bridge0: port 1(bridge_slave_0) entered blocking state [ 370.774265][ T2190] bridge0: port 1(bridge_slave_0) entered forwarding state [ 370.781876][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 371.008895][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 371.027392][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 371.035621][ T60] bridge0: port 2(bridge_slave_1) entered blocking state [ 371.042504][ T60] bridge0: port 2(bridge_slave_1) entered forwarding state [ 371.054212][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 371.062425][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 371.070733][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 371.079437][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 371.385517][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 371.399286][ T2190] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 371.412843][T11070] bond_slave_1: mtu less than device minimum [ 371.433486][T10998] device veth0_vlan entered promiscuous mode [ 371.440903][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 371.450503][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 371.465150][T10998] device veth1_macvtap entered promiscuous mode [ 371.472176][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 371.482373][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 371.502540][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 371.542994][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 371.551132][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 371.757034][ T1154] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 371.765346][ T1154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 372.209659][T11088] device wg2 entered promiscuous mode [ 372.427588][T11096] device sit0 entered promiscuous mode [ 372.442867][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 372.451432][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 374.922503][T11149] device pim6reg1 entered promiscuous mode [ 375.369686][T11154] device syzkaller0 entered promiscuous mode [ 379.176932][ C0] sched: RT throttling activated [ 383.839394][T11368] device syzkaller0 entered promiscuous mode [ 385.252777][T11401] device sit0 entered promiscuous mode [ 386.424178][T11434] device sit0 left promiscuous mode [ 386.898829][T11435] bridge0: port 1(bridge_slave_0) entered blocking state [ 386.906984][T11435] bridge0: port 1(bridge_slave_0) entered disabled state [ 386.917406][T11435] device bridge_slave_0 entered promiscuous mode [ 386.924410][T11435] bridge0: port 2(bridge_slave_1) entered blocking state [ 386.931896][T11435] bridge0: port 2(bridge_slave_1) entered disabled state [ 386.939263][T11435] device bridge_slave_1 entered promiscuous mode [ 386.963680][T11436] bridge0: port 1(bridge_slave_0) entered blocking state [ 386.971262][T11436] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.034354][T11436] device bridge_slave_0 entered promiscuous mode [ 387.093512][ T324] device veth1_macvtap left promiscuous mode [ 387.245140][T11436] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.254124][T11436] bridge0: port 2(bridge_slave_1) entered disabled state [ 387.262286][T11436] device bridge_slave_1 entered promiscuous mode [ 387.269248][T11437] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.276275][T11437] bridge0: port 1(bridge_slave_0) entered disabled state [ 387.283843][T11437] device bridge_slave_0 entered promiscuous mode [ 387.393874][T11437] bridge0: port 2(bridge_slave_1) entered blocking state [ 387.408301][T11437] bridge0: port 2(bridge_slave_1) entered disabled state [ 387.418643][T11437] device bridge_slave_1 entered promiscuous mode [ 388.058311][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 388.065641][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 388.176087][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 388.184961][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 388.211764][ T42] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.218653][ T42] bridge0: port 1(bridge_slave_0) entered forwarding state [ 388.226244][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 388.234462][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 388.242754][ T42] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.249702][ T42] bridge0: port 2(bridge_slave_1) entered forwarding state [ 388.257288][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 388.265170][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 388.283890][T11435] device veth0_vlan entered promiscuous mode [ 388.318430][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 388.337901][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 388.346073][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 388.359738][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 388.381668][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 388.389799][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 388.407453][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 388.417643][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 388.436057][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 388.447195][ T42] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.454216][ T42] bridge0: port 1(bridge_slave_0) entered forwarding state [ 388.469273][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 388.477700][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 388.516465][ T42] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.523447][ T42] bridge0: port 2(bridge_slave_1) entered forwarding state [ 388.549134][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 388.566997][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 388.574555][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 388.582625][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 388.597023][ T1154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 388.610616][ T1154] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 388.625007][T11435] device veth1_macvtap entered promiscuous mode [ 388.657071][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 388.669233][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 388.677857][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 388.726550][T11436] device veth0_vlan entered promiscuous mode [ 388.736596][ T1154] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 388.744828][ T1154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 388.753027][ T1154] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 388.761317][ T1154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 388.769838][ T1154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 388.777468][ T1154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 388.785005][ T1154] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 388.792797][ T1154] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 388.800962][ T1154] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 388.808433][ T1154] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 388.826525][T11436] device veth1_macvtap entered promiscuous mode [ 388.841730][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 388.858913][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 388.869512][ T42] bridge0: port 1(bridge_slave_0) entered blocking state [ 388.876595][ T42] bridge0: port 1(bridge_slave_0) entered forwarding state [ 388.884916][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 388.893323][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 388.901361][ T42] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.908210][ T42] bridge0: port 2(bridge_slave_1) entered forwarding state [ 388.915857][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 388.923971][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 388.931894][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 388.939993][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 388.948114][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 388.955578][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 388.963534][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 388.971428][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 389.024478][T11500] device pim6reg1 entered promiscuous mode [ 389.067366][T11495] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.076106][T11495] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.088373][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 389.096756][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 389.105864][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 389.114191][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 389.123202][T11501] device wg2 entered promiscuous mode [ 389.133513][T11498] device wg2 left promiscuous mode [ 389.143613][T11495] device bridge_slave_1 left promiscuous mode [ 389.150160][T11495] bridge0: port 2(bridge_slave_1) entered disabled state [ 389.159417][T11495] device bridge_slave_0 left promiscuous mode [ 389.165617][T11495] bridge0: port 1(bridge_slave_0) entered disabled state [ 389.244990][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 389.254500][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 389.268616][T11437] device veth0_vlan entered promiscuous mode [ 389.283267][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 389.295359][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 389.334850][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 389.342751][ T60] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 389.383934][T11506] device veth1_macvtap left promiscuous mode [ 389.506474][T11513] device veth1_macvtap entered promiscuous mode [ 389.554563][T11513] device macsec0 entered promiscuous mode [ 389.790144][ T6645] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 389.820581][ T6645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 389.883524][T11437] device veth1_macvtap entered promiscuous mode [ 389.957923][ T6645] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 389.965603][ T6645] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 390.024279][ T6645] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 390.137688][ T324] device bridge_slave_1 left promiscuous mode [ 390.143670][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.215973][ T324] device bridge_slave_0 left promiscuous mode [ 390.248744][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.387756][ T324] device bridge_slave_1 left promiscuous mode [ 390.393904][ T324] bridge0: port 2(bridge_slave_1) entered disabled state [ 390.538912][ T324] device bridge_slave_0 left promiscuous mode [ 390.544885][ T324] bridge0: port 1(bridge_slave_0) entered disabled state [ 390.636810][ T324] device veth1_macvtap left promiscuous mode [ 390.689217][ T324] device veth0_vlan left promiscuous mode [ 390.756391][ T324] device veth1_macvtap left promiscuous mode [ 390.762277][ T324] device veth0_vlan left promiscuous mode [ 391.867075][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 391.876547][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 392.295295][T11561] device sit0 entered promiscuous mode [ 394.013321][T11608] device sit0 entered promiscuous mode [ 395.408033][T11610] device sit0 left promiscuous mode [ 395.655796][T11636] device pim6reg1 entered promiscuous mode [ 396.217589][T11650] device veth1_macvtap left promiscuous mode [ 396.311802][T11650] device veth1_macvtap entered promiscuous mode [ 396.385919][T11650] device macsec0 entered promiscuous mode [ 396.650223][T11653] device sit0 left promiscuous mode [ 397.222149][T11677] device pim6reg1 entered promiscuous mode [ 398.751099][T11714] device pim6reg1 entered promiscuous mode [ 399.676434][T11747] FAULT_INJECTION: forcing a failure. [ 399.676434][T11747] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 399.877123][T11747] CPU: 0 PID: 11747 Comm: syz.4.3619 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 399.889060][T11747] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 399.899647][T11747] Call Trace: [ 399.902869][T11747] [ 399.905633][T11747] dump_stack_lvl+0x151/0x1c0 [ 399.910147][T11747] ? io_uring_drop_tctx_refs+0x190/0x190 [ 399.915619][T11747] ? unwind_get_return_address+0x4d/0x90 [ 399.921082][T11747] ? arch_stack_walk+0xf3/0x140 [ 399.925770][T11747] dump_stack+0x15/0x20 [ 399.929785][T11747] should_fail+0x3c6/0x510 [ 399.934021][T11747] should_fail_alloc_page+0x5a/0x80 [ 399.939061][T11747] prepare_alloc_pages+0x15c/0x700 [ 399.944017][T11747] ? stack_trace_snprint+0xf0/0xf0 [ 399.948940][T11747] ? __alloc_pages_bulk+0xe40/0xe40 [ 399.953991][T11747] ? copy_page_range+0x2c97/0x2f90 [ 399.958937][T11747] __alloc_pages+0x18c/0x8f0 [ 399.963347][T11747] ? x64_sys_call+0x1b0/0x9a0 [ 399.967862][T11747] ? prep_new_page+0x110/0x110 [ 399.972496][T11747] new_slab+0x9a/0x4e0 [ 399.976457][T11747] ___slab_alloc+0x39e/0x830 [ 399.980970][T11747] ? vm_area_dup+0x26/0x230 [ 399.985310][T11747] ? vm_area_dup+0x26/0x230 [ 399.989742][T11747] __slab_alloc+0x4a/0x90 [ 399.993920][T11747] ? vm_area_dup+0x26/0x230 [ 399.998248][T11747] kmem_cache_alloc+0x134/0x200 [ 400.002928][T11747] vm_area_dup+0x26/0x230 [ 400.007298][T11747] copy_mm+0x9a1/0x13e0 [ 400.011283][T11747] ? copy_signal+0x610/0x610 [ 400.016315][T11747] ? __init_rwsem+0xfe/0x1d0 [ 400.021087][T11747] ? copy_signal+0x4e3/0x610 [ 400.025688][T11747] copy_process+0x1149/0x3290 [ 400.031724][T11747] ? __kasan_check_write+0x14/0x20 [ 400.036662][T11747] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 400.042921][T11747] ? vfs_write+0x9ec/0x1110 [ 400.048508][T11747] kernel_clone+0x21e/0x9e0 [ 400.053154][T11747] ? __kasan_check_write+0x14/0x20 [ 400.058246][T11747] ? create_io_thread+0x1e0/0x1e0 [ 400.063481][T11747] __x64_sys_clone+0x23f/0x290 [ 400.068069][T11747] ? __do_sys_vfork+0x130/0x130 [ 400.072751][T11747] ? debug_smp_processor_id+0x17/0x20 [ 400.078119][T11747] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 400.084117][T11747] ? exit_to_user_mode_prepare+0x39/0xa0 [ 400.089579][T11747] x64_sys_call+0x1b0/0x9a0 [ 400.093915][T11747] do_syscall_64+0x3b/0xb0 [ 400.098277][T11747] ? clear_bhb_loop+0x35/0x90 [ 400.102774][T11747] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 400.108506][T11747] RIP: 0033:0x7f90c46e3ff9 [ 400.112856][T11747] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 400.132651][T11747] RSP: 002b:00007f90c335cfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 400.141713][T11747] RAX: ffffffffffffffda RBX: 00007f90c489bf80 RCX: 00007f90c46e3ff9 [ 400.151453][T11747] RDX: 0000000020001900 RSI: 0000000000000000 RDI: 00000000051c4000 [ 400.160547][T11747] RBP: 00007f90c335d090 R08: 0000000020001980 R09: 0000000020001980 [ 400.169135][T11747] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 400.177665][T11747] R13: 0000000000000001 R14: 00007f90c489bf80 R15: 00007ffdb830c8d8 [ 400.186090][T11747] [ 400.275838][T11752] ÿÿÿÿÿÿ: renamed from vlan0 [ 400.438105][T11760] device pim6reg1 entered promiscuous mode [ 401.208987][T11787] FAULT_INJECTION: forcing a failure. [ 401.208987][T11787] name failslab, interval 1, probability 0, space 0, times 0 [ 401.363162][T11787] CPU: 1 PID: 11787 Comm: syz.3.3635 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 401.374564][T11787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 401.384929][T11787] Call Trace: [ 401.388013][T11787] [ 401.390795][T11787] dump_stack_lvl+0x151/0x1c0 [ 401.395303][T11787] ? io_uring_drop_tctx_refs+0x190/0x190 [ 401.400772][T11787] ? kmem_cache_free+0x116/0x2e0 [ 401.405546][T11787] dump_stack+0x15/0x20 [ 401.409625][T11787] should_fail+0x3c6/0x510 [ 401.413914][T11787] __should_failslab+0xa4/0xe0 [ 401.418480][T11787] ? dup_task_struct+0x53/0xc60 [ 401.423370][T11787] should_failslab+0x9/0x20 [ 401.427709][T11787] slab_pre_alloc_hook+0x37/0xd0 [ 401.432578][T11787] ? dup_task_struct+0x53/0xc60 [ 401.437264][T11787] kmem_cache_alloc+0x44/0x200 [ 401.441895][T11787] dup_task_struct+0x53/0xc60 [ 401.446652][T11787] ? __kasan_check_write+0x14/0x20 [ 401.451576][T11787] copy_process+0x5c4/0x3290 [ 401.456002][T11787] ? __kasan_check_write+0x14/0x20 [ 401.460958][T11787] ? selinux_file_permission+0x2c4/0x570 [ 401.466505][T11787] ? proc_fail_nth_read+0x210/0x210 [ 401.471536][T11787] ? fsnotify_perm+0x6a/0x5d0 [ 401.476059][T11787] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 401.481170][T11787] ? vfs_write+0x9ec/0x1110 [ 401.485521][T11787] kernel_clone+0x21e/0x9e0 [ 401.489869][T11787] ? __kasan_check_write+0x14/0x20 [ 401.494797][T11787] ? create_io_thread+0x1e0/0x1e0 [ 401.499684][T11787] __x64_sys_clone+0x23f/0x290 [ 401.504963][T11787] ? __do_sys_vfork+0x130/0x130 [ 401.509748][T11787] ? debug_smp_processor_id+0x17/0x20 [ 401.514952][T11787] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 401.520874][T11787] ? exit_to_user_mode_prepare+0x39/0xa0 [ 401.526323][T11787] x64_sys_call+0x1b0/0x9a0 [ 401.530662][T11787] do_syscall_64+0x3b/0xb0 [ 401.534920][T11787] ? clear_bhb_loop+0x35/0x90 [ 401.539434][T11787] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 401.545338][T11787] RIP: 0033:0x7f726e588ff9 [ 401.549630][T11787] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 401.569640][T11787] RSP: 002b:00007f726d201fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 401.577882][T11787] RAX: ffffffffffffffda RBX: 00007f726e740f80 RCX: 00007f726e588ff9 [ 401.586167][T11787] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 401.593916][T11787] RBP: 00007f726d202090 R08: 0000000000000000 R09: 0000000000000000 [ 401.601732][T11787] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 401.609535][T11787] R13: 0000000000000001 R14: 00007f726e740f80 R15: 00007ffd3dd8a658 [ 401.617356][T11787] [ 402.106522][T11812] device pim6reg1 entered promiscuous mode [ 402.580220][T11827] device veth1_macvtap left promiscuous mode [ 403.519212][T11871] device veth1_macvtap left promiscuous mode [ 403.526491][T11871] device macsec0 left promiscuous mode [ 403.557732][T11873] device pim6reg1 entered promiscuous mode [ 403.721344][T11886] FAULT_INJECTION: forcing a failure. [ 403.721344][T11886] name failslab, interval 1, probability 0, space 0, times 0 [ 403.922041][T11886] CPU: 1 PID: 11886 Comm: syz.0.3669 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 403.933253][T11886] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 403.943238][T11886] Call Trace: [ 403.946357][T11886] [ 403.949139][T11886] dump_stack_lvl+0x151/0x1c0 [ 403.953655][T11886] ? io_uring_drop_tctx_refs+0x190/0x190 [ 403.959121][T11886] dump_stack+0x15/0x20 [ 403.963109][T11886] should_fail+0x3c6/0x510 [ 403.967364][T11886] __should_failslab+0xa4/0xe0 [ 403.971961][T11886] ? vm_area_dup+0x26/0x230 [ 403.976302][T11886] should_failslab+0x9/0x20 [ 403.980643][T11886] slab_pre_alloc_hook+0x37/0xd0 [ 403.985417][T11886] ? vm_area_dup+0x26/0x230 [ 403.989753][T11886] kmem_cache_alloc+0x44/0x200 [ 403.994355][T11886] vm_area_dup+0x26/0x230 [ 403.998617][T11886] copy_mm+0x9a1/0x13e0 [ 404.002698][T11886] ? copy_signal+0x610/0x610 [ 404.007203][T11886] ? __init_rwsem+0xfe/0x1d0 [ 404.011734][T11886] ? copy_signal+0x4e3/0x610 [ 404.016512][T11886] copy_process+0x1149/0x3290 [ 404.021525][T11886] ? __kasan_check_write+0x14/0x20 [ 404.026560][T11886] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 404.031857][T11886] ? vfs_write+0x9ec/0x1110 [ 404.036284][T11886] kernel_clone+0x21e/0x9e0 [ 404.040618][T11886] ? __kasan_check_write+0x14/0x20 [ 404.045571][T11886] ? create_io_thread+0x1e0/0x1e0 [ 404.050440][T11886] __x64_sys_clone+0x23f/0x290 [ 404.055117][T11886] ? __do_sys_vfork+0x130/0x130 [ 404.060504][T11886] ? debug_smp_processor_id+0x17/0x20 [ 404.065785][T11886] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 404.071860][T11886] ? exit_to_user_mode_prepare+0x39/0xa0 [ 404.077327][T11886] x64_sys_call+0x1b0/0x9a0 [ 404.081667][T11886] do_syscall_64+0x3b/0xb0 [ 404.085918][T11886] ? clear_bhb_loop+0x35/0x90 [ 404.090432][T11886] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 404.096162][T11886] RIP: 0033:0x7fd09ab57ff9 [ 404.100424][T11886] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 404.119940][T11886] RSP: 002b:00007fd0997d0fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 404.128374][T11886] RAX: ffffffffffffffda RBX: 00007fd09ad0ff80 RCX: 00007fd09ab57ff9 [ 404.136817][T11886] RDX: 0000000020001900 RSI: 0000000000000000 RDI: 00000000051c4000 [ 404.144635][T11886] RBP: 00007fd0997d1090 R08: 0000000020001980 R09: 0000000020001980 [ 404.152811][T11886] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 404.161336][T11886] R13: 0000000000000001 R14: 00007fd09ad0ff80 R15: 00007ffe5c8cf918 [ 404.169138][T11886] [ 404.688127][T11911] ÿÿÿÿÿÿ: renamed from vlan0 [ 404.863654][T11918] device pim6reg1 entered promiscuous mode [ 405.234245][T11935] FAULT_INJECTION: forcing a failure. [ 405.234245][T11935] name failslab, interval 1, probability 0, space 0, times 0 [ 405.337284][T11935] CPU: 0 PID: 11935 Comm: syz.4.3687 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 405.348600][T11935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 405.358905][T11935] Call Trace: [ 405.362639][T11935] [ 405.365409][T11935] dump_stack_lvl+0x151/0x1c0 [ 405.369923][T11935] ? io_uring_drop_tctx_refs+0x190/0x190 [ 405.375405][T11935] ? __kasan_slab_alloc+0xc3/0xe0 [ 405.380974][T11935] ? __kasan_slab_alloc+0xb1/0xe0 [ 405.385928][T11935] ? slab_post_alloc_hook+0x53/0x2c0 [ 405.391238][T11935] ? dup_task_struct+0x53/0xc60 [ 405.396248][T11935] ? copy_process+0x5c4/0x3290 [ 405.401002][T11935] ? kernel_clone+0x21e/0x9e0 [ 405.405615][T11935] dump_stack+0x15/0x20 [ 405.410032][T11935] should_fail+0x3c6/0x510 [ 405.414581][T11935] __should_failslab+0xa4/0xe0 [ 405.419131][T11935] should_failslab+0x9/0x20 [ 405.423557][T11935] slab_pre_alloc_hook+0x37/0xd0 [ 405.428418][T11935] kmem_cache_alloc_trace+0x48/0x210 [ 405.433538][T11935] ? __get_vm_area_node+0x117/0x360 [ 405.438662][T11935] __get_vm_area_node+0x117/0x360 [ 405.443723][T11935] __vmalloc_node_range+0xe2/0x8d0 [ 405.448664][T11935] ? copy_process+0x5c4/0x3290 [ 405.453351][T11935] ? slab_post_alloc_hook+0x72/0x2c0 [ 405.458990][T11935] ? dup_task_struct+0x53/0xc60 [ 405.463678][T11935] dup_task_struct+0x416/0xc60 [ 405.468481][T11935] ? copy_process+0x5c4/0x3290 [ 405.473086][T11935] ? __kasan_check_write+0x14/0x20 [ 405.478085][T11935] copy_process+0x5c4/0x3290 [ 405.483094][T11935] ? __kasan_check_write+0x14/0x20 [ 405.487979][T11935] ? selinux_file_permission+0x2c4/0x570 [ 405.493447][T11935] ? proc_fail_nth_read+0x210/0x210 [ 405.498481][T11935] ? fsnotify_perm+0x6a/0x5d0 [ 405.503081][T11935] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 405.508124][T11935] ? vfs_write+0x9ec/0x1110 [ 405.513162][T11935] kernel_clone+0x21e/0x9e0 [ 405.517597][T11935] ? __kasan_check_write+0x14/0x20 [ 405.522632][T11935] ? create_io_thread+0x1e0/0x1e0 [ 405.527566][T11935] __x64_sys_clone+0x23f/0x290 [ 405.532163][T11935] ? __do_sys_vfork+0x130/0x130 [ 405.536852][T11935] ? debug_smp_processor_id+0x17/0x20 [ 405.542493][T11935] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 405.548394][T11935] ? exit_to_user_mode_prepare+0x39/0xa0 [ 405.553866][T11935] x64_sys_call+0x1b0/0x9a0 [ 405.558201][T11935] do_syscall_64+0x3b/0xb0 [ 405.562455][T11935] ? clear_bhb_loop+0x35/0x90 [ 405.566971][T11935] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 405.572697][T11935] RIP: 0033:0x7f90c46e3ff9 [ 405.576954][T11935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 405.596406][T11935] RSP: 002b:00007f90c335cfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 405.604908][T11935] RAX: ffffffffffffffda RBX: 00007f90c489bf80 RCX: 00007f90c46e3ff9 [ 405.612826][T11935] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 405.620727][T11935] RBP: 00007f90c335d090 R08: 0000000000000000 R09: 0000000000000000 [ 405.628540][T11935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 405.636364][T11935] R13: 0000000000000001 R14: 00007f90c489bf80 R15: 00007ffdb830c8d8 [ 405.644780][T11935] [ 405.769140][T11950] device veth1_macvtap entered promiscuous mode [ 405.805239][T11950] device macsec0 entered promiscuous mode [ 405.849007][T11857] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 406.101174][T11935] syz.4.3687: vmalloc error: size 32768, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz4,mems_allowed=0 [ 406.227348][T11935] CPU: 1 PID: 11935 Comm: syz.4.3687 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 406.239039][T11935] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 406.249010][T11935] Call Trace: [ 406.252132][T11935] [ 406.254907][T11935] dump_stack_lvl+0x151/0x1c0 [ 406.259417][T11935] ? io_uring_drop_tctx_refs+0x190/0x190 [ 406.264894][T11935] ? pr_cont_kernfs_name+0xf0/0x100 [ 406.269928][T11935] dump_stack+0x15/0x20 [ 406.273915][T11935] warn_alloc+0x21a/0x390 [ 406.278079][T11935] ? should_failslab+0x9/0x20 [ 406.282795][T11935] ? zone_watermark_ok_safe+0x270/0x270 [ 406.288266][T11935] ? __get_vm_area_node+0x347/0x360 [ 406.293297][T11935] __vmalloc_node_range+0x2c1/0x8d0 [ 406.298461][T11935] ? slab_post_alloc_hook+0x72/0x2c0 [ 406.303630][T11935] ? dup_task_struct+0x53/0xc60 [ 406.308314][T11935] dup_task_struct+0x416/0xc60 [ 406.313433][T11935] ? copy_process+0x5c4/0x3290 [ 406.318037][T11935] ? __kasan_check_write+0x14/0x20 [ 406.322996][T11935] copy_process+0x5c4/0x3290 [ 406.327525][T11935] ? __kasan_check_write+0x14/0x20 [ 406.332556][T11935] ? selinux_file_permission+0x2c4/0x570 [ 406.338037][T11935] ? proc_fail_nth_read+0x210/0x210 [ 406.343349][T11935] ? fsnotify_perm+0x6a/0x5d0 [ 406.349391][T11935] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 406.355344][T11935] ? vfs_write+0x9ec/0x1110 [ 406.360247][T11935] kernel_clone+0x21e/0x9e0 [ 406.365563][T11935] ? __kasan_check_write+0x14/0x20 [ 406.371237][T11935] ? create_io_thread+0x1e0/0x1e0 [ 406.377759][T11935] __x64_sys_clone+0x23f/0x290 [ 406.382591][T11935] ? __do_sys_vfork+0x130/0x130 [ 406.387249][T11935] ? debug_smp_processor_id+0x17/0x20 [ 406.392457][T11935] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 406.400005][T11935] ? exit_to_user_mode_prepare+0x39/0xa0 [ 406.405630][T11935] x64_sys_call+0x1b0/0x9a0 [ 406.410576][T11935] do_syscall_64+0x3b/0xb0 [ 406.414898][T11935] ? clear_bhb_loop+0x35/0x90 [ 406.419692][T11935] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 406.426014][T11935] RIP: 0033:0x7f90c46e3ff9 [ 406.430268][T11935] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 406.449907][T11935] RSP: 002b:00007f90c335cfe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 406.458145][T11935] RAX: ffffffffffffffda RBX: 00007f90c489bf80 RCX: 00007f90c46e3ff9 [ 406.465956][T11935] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 406.473777][T11935] RBP: 00007f90c335d090 R08: 0000000000000000 R09: 0000000000000000 [ 406.481791][T11935] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 406.489595][T11935] R13: 0000000000000001 R14: 00007f90c489bf80 R15: 00007ffdb830c8d8 [ 406.497422][T11935] [ 406.540192][T11935] Mem-Info: [ 406.543147][T11935] active_anon:129 inactive_anon:10398 isolated_anon:0 [ 406.543147][T11935] active_file:23990 inactive_file:2627 isolated_file:0 [ 406.543147][T11935] unevictable:0 dirty:173 writeback:0 [ 406.543147][T11935] slab_reclaimable:8147 slab_unreclaimable:76593 [ 406.543147][T11935] mapped:23215 shmem:2735 pagetables:518 bounce:0 [ 406.543147][T11935] kernel_misc_reclaimable:0 [ 406.543147][T11935] free:1547451 free_pcp:24427 free_cma:0 [ 406.684926][T11973] device pim6reg1 entered promiscuous mode [ 406.907133][T11935] Node 0 active_anon:516kB inactive_anon:55692kB active_file:95960kB inactive_file:10508kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:107060kB dirty:692kB writeback:0kB shmem:24940kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:4164kB pagetables:2172kB all_unreclaimable? no [ 406.965330][T11935] DMA32 free:2974676kB min:62568kB low:78208kB high:93848kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3145324kB managed:2978976kB mlocked:0kB bounce:0kB free_pcp:4300kB local_pcp:4244kB free_cma:0kB [ 406.997047][T11935] lowmem_reserve[]: 0 3941 3941 [ 407.001836][T11935] Normal free:3214064kB min:84884kB low:106104kB high:127324kB reserved_highatomic:0KB active_anon:516kB inactive_anon:56492kB active_file:95960kB inactive_file:10508kB unevictable:0kB writepending:692kB present:5242880kB managed:4035584kB mlocked:0kB bounce:0kB free_pcp:80092kB local_pcp:39244kB free_cma:0kB [ 407.048196][T11935] lowmem_reserve[]: 0 0 0 [ 407.053000][T11935] DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 3*32kB (M) 3*64kB (M) 3*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (UM) 3*2048kB (UM) 723*4096kB (M) = 2974676kB [ 407.068811][T11935] Normal: 270*4kB (UME) 31*8kB (UM) 26*16kB (UME) 263*32kB (UM) 229*64kB (UE) 40*128kB (UM) 46*256kB (UME) 22*512kB (UM) 7*1024kB (UME) 2*2048kB (UE) 769*4096kB (UM) = 3214064kB [ 407.086716][T11935] 33836 total pagecache pages [ 407.092218][T11935] 0 pages in swap cache [ 407.096177][T11935] Swap cache stats: add 0, delete 0, find 0/0 [ 407.138336][T11994] device veth1_macvtap entered promiscuous mode [ 407.157041][T11994] device macsec0 entered promiscuous mode [ 407.161037][T11935] Free swap = 124996kB [ 407.189331][T11935] Total swap = 124996kB [ 407.223210][T11935] 2097051 pages RAM [ 407.243501][T11935] 0 pages HighMem/MovableOnly [ 407.284330][T11935] 343411 pages reserved [ 407.286666][T11856] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 407.306331][T11935] 0 pages cma reserved [ 407.484203][T12009] FAULT_INJECTION: forcing a failure. [ 407.484203][T12009] name failslab, interval 1, probability 0, space 0, times 0 [ 407.580178][T12013] device pim6reg1 entered promiscuous mode [ 407.671528][T12009] CPU: 1 PID: 12009 Comm: syz.3.3715 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 407.683445][T12009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 407.693335][T12009] Call Trace: [ 407.696562][T12009] [ 407.699415][T12009] dump_stack_lvl+0x151/0x1c0 [ 407.704153][T12009] ? io_uring_drop_tctx_refs+0x190/0x190 [ 407.709608][T12009] dump_stack+0x15/0x20 [ 407.713594][T12009] should_fail+0x3c6/0x510 [ 407.717936][T12009] __should_failslab+0xa4/0xe0 [ 407.722534][T12009] ? vm_area_dup+0x26/0x230 [ 407.726960][T12009] should_failslab+0x9/0x20 [ 407.731389][T12009] slab_pre_alloc_hook+0x37/0xd0 [ 407.736261][T12009] ? vm_area_dup+0x26/0x230 [ 407.740591][T12009] kmem_cache_alloc+0x44/0x200 [ 407.745192][T12009] vm_area_dup+0x26/0x230 [ 407.749408][T12009] copy_mm+0x9a1/0x13e0 [ 407.753443][T12009] ? copy_signal+0x610/0x610 [ 407.758077][T12009] ? __init_rwsem+0xfe/0x1d0 [ 407.762499][T12009] ? copy_signal+0x4e3/0x610 [ 407.766926][T12009] copy_process+0x1149/0x3290 [ 407.771437][T12009] ? __kasan_check_write+0x14/0x20 [ 407.776472][T12009] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 407.781420][T12009] ? vfs_write+0x9ec/0x1110 [ 407.785758][T12009] kernel_clone+0x21e/0x9e0 [ 407.790099][T12009] ? __kasan_check_write+0x14/0x20 [ 407.795084][T12009] ? create_io_thread+0x1e0/0x1e0 [ 407.799909][T12009] __x64_sys_clone+0x23f/0x290 [ 407.804509][T12009] ? __do_sys_vfork+0x130/0x130 [ 407.809192][T12009] ? debug_smp_processor_id+0x17/0x20 [ 407.814401][T12009] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 407.820313][T12009] ? exit_to_user_mode_prepare+0x39/0xa0 [ 407.825773][T12009] x64_sys_call+0x1b0/0x9a0 [ 407.830112][T12009] do_syscall_64+0x3b/0xb0 [ 407.834361][T12009] ? clear_bhb_loop+0x35/0x90 [ 407.838880][T12009] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 407.844792][T12009] RIP: 0033:0x7f726e588ff9 [ 407.849036][T12009] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 407.868493][T12009] RSP: 002b:00007f726d201fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 407.876717][T12009] RAX: ffffffffffffffda RBX: 00007f726e740f80 RCX: 00007f726e588ff9 [ 407.884527][T12009] RDX: 0000000020001900 RSI: 0000000000000000 RDI: 00000000051c4000 [ 407.892339][T12009] RBP: 00007f726d202090 R08: 0000000020001980 R09: 0000000020001980 [ 407.900149][T12009] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 407.907959][T12009] R13: 0000000000000001 R14: 00007f726e740f80 R15: 00007ffd3dd8a658 [ 407.915781][T12009] [ 408.088137][T12037] device veth1_macvtap left promiscuous mode [ 408.097085][T12037] device macsec0 left promiscuous mode [ 408.120696][T12037] device veth1_macvtap entered promiscuous mode [ 408.137733][T12037] device macsec0 entered promiscuous mode [ 408.181298][T12053] FAULT_INJECTION: forcing a failure. [ 408.181298][T12053] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 408.197783][T12053] CPU: 1 PID: 12053 Comm: syz.1.3731 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 408.208987][T12053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 408.218878][T12053] Call Trace: [ 408.222000][T12053] [ 408.224780][T12053] dump_stack_lvl+0x151/0x1c0 [ 408.229291][T12053] ? io_uring_drop_tctx_refs+0x190/0x190 [ 408.234766][T12053] dump_stack+0x15/0x20 [ 408.238755][T12053] should_fail+0x3c6/0x510 [ 408.243006][T12053] should_fail_alloc_page+0x5a/0x80 [ 408.248052][T12053] prepare_alloc_pages+0x15c/0x700 [ 408.252996][T12053] ? __alloc_pages+0x8f0/0x8f0 [ 408.257587][T12053] ? __alloc_pages_bulk+0xe40/0xe40 [ 408.262627][T12053] __alloc_pages+0x18c/0x8f0 [ 408.267059][T12053] ? prep_new_page+0x110/0x110 [ 408.271665][T12053] ? __mod_node_page_state+0xac/0xf0 [ 408.276768][T12053] pte_alloc_one+0x73/0x1b0 [ 408.281105][T12053] ? pfn_modify_allowed+0x2f0/0x2f0 [ 408.286142][T12053] ? arch_stack_walk+0xf3/0x140 [ 408.290828][T12053] __pte_alloc+0x86/0x350 [ 408.294994][T12053] ? free_pgtables+0x280/0x280 [ 408.299591][T12053] ? _raw_spin_lock+0xa4/0x1b0 [ 408.304198][T12053] ? __kasan_check_write+0x14/0x20 [ 408.309143][T12053] copy_page_range+0x28a8/0x2f90 [ 408.313916][T12053] ? __kasan_slab_alloc+0xb1/0xe0 [ 408.318782][T12053] ? pfn_valid+0x1e0/0x1e0 [ 408.323031][T12053] ? vma_interval_tree_augment_rotate+0x178/0x1d0 [ 408.329281][T12053] copy_mm+0xc7e/0x13e0 [ 408.333275][T12053] ? copy_signal+0x610/0x610 [ 408.337710][T12053] ? __init_rwsem+0xfe/0x1d0 [ 408.342208][T12053] ? copy_signal+0x4e3/0x610 [ 408.346637][T12053] copy_process+0x1149/0x3290 [ 408.351164][T12053] ? __kasan_check_write+0x14/0x20 [ 408.356100][T12053] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 408.361045][T12053] ? vfs_write+0x9ec/0x1110 [ 408.365386][T12053] kernel_clone+0x21e/0x9e0 [ 408.370506][T12053] ? __kasan_check_write+0x14/0x20 [ 408.375535][T12053] ? create_io_thread+0x1e0/0x1e0 [ 408.380500][T12053] __x64_sys_clone+0x23f/0x290 [ 408.385086][T12053] ? __do_sys_vfork+0x130/0x130 [ 408.389774][T12053] ? debug_smp_processor_id+0x17/0x20 [ 408.394979][T12053] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 408.400885][T12053] ? exit_to_user_mode_prepare+0x39/0xa0 [ 408.406361][T12053] x64_sys_call+0x1b0/0x9a0 [ 408.410687][T12053] do_syscall_64+0x3b/0xb0 [ 408.415038][T12053] ? clear_bhb_loop+0x35/0x90 [ 408.419545][T12053] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 408.425272][T12053] RIP: 0033:0x7fc01643eff9 [ 408.429523][T12053] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 408.449248][T12053] RSP: 002b:00007fc0150b7fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 408.457547][T12053] RAX: ffffffffffffffda RBX: 00007fc0165f6f80 RCX: 00007fc01643eff9 [ 408.465358][T12053] RDX: 0000000020001900 RSI: 0000000000000000 RDI: 00000000051c4000 [ 408.473343][T12053] RBP: 00007fc0150b8090 R08: 0000000020001980 R09: 0000000020001980 [ 408.481338][T12053] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 408.489141][T12053] R13: 0000000000000001 R14: 00007fc0165f6f80 R15: 00007fffebf6fa48 [ 408.496963][T12053] [ 408.729428][T12071] device pim6reg1 entered promiscuous mode [ 409.045222][T12088] device veth1_macvtap left promiscuous mode [ 409.046966][T12090] FAULT_INJECTION: forcing a failure. [ 409.046966][T12090] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 409.064809][T12090] CPU: 1 PID: 12090 Comm: syz.0.3744 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 409.076434][T12090] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 409.086454][T12090] Call Trace: [ 409.089572][T12090] [ 409.092354][T12090] dump_stack_lvl+0x151/0x1c0 [ 409.096951][T12090] ? io_uring_drop_tctx_refs+0x190/0x190 [ 409.102598][T12090] ? unwind_get_return_address+0x4d/0x90 [ 409.108148][T12090] ? arch_stack_walk+0xf3/0x140 [ 409.112922][T12090] dump_stack+0x15/0x20 [ 409.116913][T12090] should_fail+0x3c6/0x510 [ 409.121166][T12090] should_fail_alloc_page+0x5a/0x80 [ 409.126320][T12090] prepare_alloc_pages+0x15c/0x700 [ 409.131260][T12090] ? stack_trace_snprint+0xf0/0xf0 [ 409.136194][T12090] ? __alloc_pages_bulk+0xe40/0xe40 [ 409.141376][T12090] ? copy_page_range+0x2c97/0x2f90 [ 409.146366][T12090] __alloc_pages+0x18c/0x8f0 [ 409.150863][T12090] ? x64_sys_call+0x1b0/0x9a0 [ 409.155644][T12090] ? prep_new_page+0x110/0x110 [ 409.160374][T12090] new_slab+0x9a/0x4e0 [ 409.164736][T12090] ___slab_alloc+0x39e/0x830 [ 409.169971][T12090] ? vm_area_dup+0x26/0x230 [ 409.174352][T12090] ? vm_area_dup+0x26/0x230 [ 409.178721][T12090] __slab_alloc+0x4a/0x90 [ 409.182891][T12090] ? vm_area_dup+0x26/0x230 [ 409.187235][T12090] kmem_cache_alloc+0x134/0x200 [ 409.192001][T12090] vm_area_dup+0x26/0x230 [ 409.196276][T12090] copy_mm+0x9a1/0x13e0 [ 409.200254][T12090] ? copy_signal+0x610/0x610 [ 409.206059][T12090] ? __init_rwsem+0xfe/0x1d0 [ 409.210596][T12090] ? copy_signal+0x4e3/0x610 [ 409.215081][T12090] copy_process+0x1149/0x3290 [ 409.219598][T12090] ? __kasan_check_write+0x14/0x20 [ 409.224723][T12090] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 409.229689][T12090] ? vfs_write+0x9ec/0x1110 [ 409.234005][T12090] kernel_clone+0x21e/0x9e0 [ 409.238441][T12090] ? __kasan_check_write+0x14/0x20 [ 409.243556][T12090] ? create_io_thread+0x1e0/0x1e0 [ 409.248415][T12090] __x64_sys_clone+0x23f/0x290 [ 409.253126][T12090] ? __do_sys_vfork+0x130/0x130 [ 409.257787][T12090] ? debug_smp_processor_id+0x17/0x20 [ 409.263110][T12090] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 409.269001][T12090] ? exit_to_user_mode_prepare+0x39/0xa0 [ 409.274457][T12090] x64_sys_call+0x1b0/0x9a0 [ 409.278810][T12090] do_syscall_64+0x3b/0xb0 [ 409.283153][T12090] ? clear_bhb_loop+0x35/0x90 [ 409.287650][T12090] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 409.293378][T12090] RIP: 0033:0x7fd09ab57ff9 [ 409.297640][T12090] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 409.317187][T12090] RSP: 002b:00007fd0997d0fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 409.325578][T12090] RAX: ffffffffffffffda RBX: 00007fd09ad0ff80 RCX: 00007fd09ab57ff9 [ 409.333478][T12090] RDX: 0000000020001900 RSI: 0000000000000000 RDI: 00000000051c4000 [ 409.341287][T12090] RBP: 00007fd0997d1090 R08: 0000000020001980 R09: 0000000020001980 [ 409.349103][T12090] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 409.356910][T12090] R13: 0000000000000001 R14: 00007fd09ad0ff80 R15: 00007ffe5c8cf918 [ 409.364755][T12090] [ 409.399692][T12095] device veth1_macvtap entered promiscuous mode [ 409.411968][T12095] device macsec0 entered promiscuous mode [ 409.801811][T12122] device pim6reg1 entered promiscuous mode [ 410.180703][T12147] device veth1_macvtap left promiscuous mode [ 410.193644][T12147] device macsec0 left promiscuous mode [ 410.250229][T12153] FAULT_INJECTION: forcing a failure. [ 410.250229][T12153] name failslab, interval 1, probability 0, space 0, times 0 [ 410.531850][T12153] CPU: 0 PID: 12153 Comm: syz.1.3767 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 410.543063][T12153] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 410.553812][T12153] Call Trace: [ 410.556860][T12153] [ 410.559641][T12153] dump_stack_lvl+0x151/0x1c0 [ 410.564180][T12153] ? io_uring_drop_tctx_refs+0x190/0x190 [ 410.569723][T12153] dump_stack+0x15/0x20 [ 410.573698][T12153] should_fail+0x3c6/0x510 [ 410.577949][T12153] __should_failslab+0xa4/0xe0 [ 410.582551][T12153] ? vm_area_dup+0x26/0x230 [ 410.586894][T12153] should_failslab+0x9/0x20 [ 410.591229][T12153] slab_pre_alloc_hook+0x37/0xd0 [ 410.596006][T12153] ? vm_area_dup+0x26/0x230 [ 410.600436][T12153] kmem_cache_alloc+0x44/0x200 [ 410.605031][T12153] vm_area_dup+0x26/0x230 [ 410.609299][T12153] copy_mm+0x9a1/0x13e0 [ 410.613288][T12153] ? copy_signal+0x610/0x610 [ 410.618241][T12153] ? __init_rwsem+0xfe/0x1d0 [ 410.622705][T12153] ? copy_signal+0x4e3/0x610 [ 410.627284][T12153] copy_process+0x1149/0x3290 [ 410.631802][T12153] ? __kasan_check_write+0x14/0x20 [ 410.636769][T12153] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 410.641691][T12153] ? vfs_write+0x9ec/0x1110 [ 410.646037][T12153] kernel_clone+0x21e/0x9e0 [ 410.650372][T12153] ? __kasan_check_write+0x14/0x20 [ 410.655316][T12153] ? create_io_thread+0x1e0/0x1e0 [ 410.660181][T12153] __x64_sys_clone+0x23f/0x290 [ 410.664778][T12153] ? __do_sys_vfork+0x130/0x130 [ 410.669473][T12153] ? debug_smp_processor_id+0x17/0x20 [ 410.674671][T12153] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 410.680616][T12153] ? exit_to_user_mode_prepare+0x39/0xa0 [ 410.686041][T12153] x64_sys_call+0x1b0/0x9a0 [ 410.690379][T12153] do_syscall_64+0x3b/0xb0 [ 410.694721][T12153] ? clear_bhb_loop+0x35/0x90 [ 410.699439][T12153] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 410.705134][T12153] RIP: 0033:0x7fc01643eff9 [ 410.709392][T12153] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 410.728832][T12153] RSP: 002b:00007fc0150b7fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 410.737284][T12153] RAX: ffffffffffffffda RBX: 00007fc0165f6f80 RCX: 00007fc01643eff9 [ 410.745096][T12153] RDX: 0000000020001900 RSI: 0000000000000000 RDI: 00000000051c4000 [ 410.753164][T12153] RBP: 00007fc0150b8090 R08: 0000000020001980 R09: 0000000020001980 [ 410.761065][T12153] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 410.769003][T12153] R13: 0000000000000001 R14: 00007fc0165f6f80 R15: 00007fffebf6fa48 [ 410.777424][T12153] [ 410.794471][T12159] device pim6reg1 entered promiscuous mode [ 410.927939][T12179] device veth1_macvtap left promiscuous mode [ 410.939639][T12179] device macsec0 left promiscuous mode [ 411.294973][T12197] FAULT_INJECTION: forcing a failure. [ 411.294973][T12197] name failslab, interval 1, probability 0, space 0, times 0 [ 411.398345][T12197] CPU: 0 PID: 12197 Comm: syz.0.3782 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 411.410875][T12197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 411.421667][T12197] Call Trace: [ 411.424791][T12197] [ 411.427564][T12197] dump_stack_lvl+0x151/0x1c0 [ 411.432089][T12197] ? io_uring_drop_tctx_refs+0x190/0x190 [ 411.437544][T12197] dump_stack+0x15/0x20 [ 411.441901][T12197] should_fail+0x3c6/0x510 [ 411.446769][T12197] __should_failslab+0xa4/0xe0 [ 411.451766][T12197] ? vm_area_dup+0x26/0x230 [ 411.456447][T12197] should_failslab+0x9/0x20 [ 411.461065][T12197] slab_pre_alloc_hook+0x37/0xd0 [ 411.466077][T12197] ? vm_area_dup+0x26/0x230 [ 411.470413][T12197] kmem_cache_alloc+0x44/0x200 [ 411.475188][T12197] vm_area_dup+0x26/0x230 [ 411.479730][T12197] copy_mm+0x9a1/0x13e0 [ 411.484133][T12197] ? copy_signal+0x610/0x610 [ 411.488639][T12197] ? __init_rwsem+0xfe/0x1d0 [ 411.493067][T12197] ? copy_signal+0x4e3/0x610 [ 411.497677][T12197] copy_process+0x1149/0x3290 [ 411.502183][T12197] ? __kasan_check_write+0x14/0x20 [ 411.507217][T12197] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 411.512248][T12197] ? vfs_write+0x9ec/0x1110 [ 411.516592][T12197] kernel_clone+0x21e/0x9e0 [ 411.520927][T12197] ? __kasan_check_write+0x14/0x20 [ 411.525876][T12197] ? create_io_thread+0x1e0/0x1e0 [ 411.530744][T12197] __x64_sys_clone+0x23f/0x290 [ 411.535338][T12197] ? __do_sys_vfork+0x130/0x130 [ 411.540027][T12197] ? debug_smp_processor_id+0x17/0x20 [ 411.545677][T12197] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 411.551747][T12197] ? exit_to_user_mode_prepare+0x39/0xa0 [ 411.557292][T12197] x64_sys_call+0x1b0/0x9a0 [ 411.561721][T12197] do_syscall_64+0x3b/0xb0 [ 411.565974][T12197] ? clear_bhb_loop+0x35/0x90 [ 411.570488][T12197] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 411.576226][T12197] RIP: 0033:0x7fd09ab57ff9 [ 411.580471][T12197] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 411.600092][T12197] RSP: 002b:00007fd0997d0fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 411.608347][T12197] RAX: ffffffffffffffda RBX: 00007fd09ad0ff80 RCX: 00007fd09ab57ff9 [ 411.616317][T12197] RDX: 0000000020001900 RSI: 0000000000000000 RDI: 00000000051c4000 [ 411.624132][T12197] RBP: 00007fd0997d1090 R08: 0000000020001980 R09: 0000000020001980 [ 411.632598][T12197] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 411.640371][T12197] R13: 0000000000000001 R14: 00007fd09ad0ff80 R15: 00007ffe5c8cf918 [ 411.648179][T12197] [ 412.590213][T12223] device veth1_macvtap left promiscuous mode [ 412.598752][T12223] device macsec0 left promiscuous mode [ 412.621979][T12213] device pim6reg1 entered promiscuous mode [ 412.770114][T12234] FAULT_INJECTION: forcing a failure. [ 412.770114][T12234] name failslab, interval 1, probability 0, space 0, times 0 [ 412.857365][T12234] CPU: 0 PID: 12234 Comm: syz.0.3796 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 412.868745][T12234] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 412.878726][T12234] Call Trace: [ 412.882047][T12234] [ 412.884940][T12234] dump_stack_lvl+0x151/0x1c0 [ 412.889613][T12234] ? io_uring_drop_tctx_refs+0x190/0x190 [ 412.895096][T12234] ? avc_denied+0x1b0/0x1b0 [ 412.899505][T12234] dump_stack+0x15/0x20 [ 412.903991][T12234] should_fail+0x3c6/0x510 [ 412.908283][T12234] __should_failslab+0xa4/0xe0 [ 412.913686][T12234] ? vm_area_dup+0x26/0x230 [ 412.918432][T12234] should_failslab+0x9/0x20 [ 412.922773][T12234] slab_pre_alloc_hook+0x37/0xd0 [ 412.927547][T12234] ? vm_area_dup+0x26/0x230 [ 412.931900][T12234] kmem_cache_alloc+0x44/0x200 [ 412.936488][T12234] vm_area_dup+0x26/0x230 [ 412.940655][T12234] copy_mm+0x9a1/0x13e0 [ 412.944646][T12234] ? copy_signal+0x610/0x610 [ 412.949165][T12234] ? __init_rwsem+0xfe/0x1d0 [ 412.953582][T12234] ? copy_signal+0x4e3/0x610 [ 412.958018][T12234] copy_process+0x1149/0x3290 [ 412.962524][T12234] ? __kasan_check_write+0x14/0x20 [ 412.967569][T12234] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 412.972514][T12234] ? vfs_write+0x9ec/0x1110 [ 412.976859][T12234] kernel_clone+0x21e/0x9e0 [ 412.981195][T12234] ? __kasan_check_write+0x14/0x20 [ 412.986140][T12234] ? create_io_thread+0x1e0/0x1e0 [ 412.991005][T12234] __x64_sys_clone+0x23f/0x290 [ 412.995605][T12234] ? __do_sys_vfork+0x130/0x130 [ 413.000287][T12234] ? debug_smp_processor_id+0x17/0x20 [ 413.005496][T12234] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 413.011411][T12234] ? exit_to_user_mode_prepare+0x39/0xa0 [ 413.016869][T12234] x64_sys_call+0x1b0/0x9a0 [ 413.021205][T12234] do_syscall_64+0x3b/0xb0 [ 413.025458][T12234] ? clear_bhb_loop+0x35/0x90 [ 413.029972][T12234] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 413.035788][T12234] RIP: 0033:0x7fd09ab57ff9 [ 413.040040][T12234] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 413.059489][T12234] RSP: 002b:00007fd0997d0fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 413.067723][T12234] RAX: ffffffffffffffda RBX: 00007fd09ad0ff80 RCX: 00007fd09ab57ff9 [ 413.075542][T12234] RDX: 0000000020001900 RSI: 0000000000000000 RDI: 00000000051c4000 [ 413.083346][T12234] RBP: 00007fd0997d1090 R08: 0000000020001980 R09: 0000000020001980 [ 413.091160][T12234] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 413.098976][T12234] R13: 0000000000000001 R14: 00007fd09ad0ff80 R15: 00007ffe5c8cf918 [ 413.106961][T12234] [ 413.495142][T12263] device pim6reg1 entered promiscuous mode [ 414.085487][T12280] device veth1_macvtap left promiscuous mode [ 414.108190][T12280] device macsec0 left promiscuous mode [ 414.232454][T12280] device veth1_macvtap entered promiscuous mode [ 414.242045][T12280] device macsec0 entered promiscuous mode [ 414.295868][T12301] FAULT_INJECTION: forcing a failure. [ 414.295868][T12301] name failslab, interval 1, probability 0, space 0, times 0 [ 414.414538][T12297] ÿÿÿÿÿÿ: renamed from vlan0 [ 414.414610][T12301] CPU: 1 PID: 12301 Comm: syz.1.3818 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 414.430251][T12301] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 414.440147][T12301] Call Trace: [ 414.443357][T12301] [ 414.446193][T12301] dump_stack_lvl+0x151/0x1c0 [ 414.450648][T12301] ? io_uring_drop_tctx_refs+0x190/0x190 [ 414.456112][T12301] dump_stack+0x15/0x20 [ 414.460107][T12301] should_fail+0x3c6/0x510 [ 414.464360][T12301] __should_failslab+0xa4/0xe0 [ 414.468957][T12301] ? anon_vma_clone+0x9a/0x500 [ 414.473645][T12301] should_failslab+0x9/0x20 [ 414.477986][T12301] slab_pre_alloc_hook+0x37/0xd0 [ 414.482771][T12301] ? anon_vma_clone+0x9a/0x500 [ 414.487359][T12301] kmem_cache_alloc+0x44/0x200 [ 414.492241][T12301] anon_vma_clone+0x9a/0x500 [ 414.496661][T12301] anon_vma_fork+0x91/0x4e0 [ 414.500998][T12301] ? anon_vma_name+0x43/0x70 [ 414.505423][T12301] ? vm_area_dup+0x17a/0x230 [ 414.509850][T12301] copy_mm+0xa3a/0x13e0 [ 414.513850][T12301] ? copy_signal+0x610/0x610 [ 414.518268][T12301] ? __init_rwsem+0xfe/0x1d0 [ 414.522695][T12301] ? copy_signal+0x4e3/0x610 [ 414.527123][T12301] copy_process+0x1149/0x3290 [ 414.531636][T12301] ? __kasan_check_write+0x14/0x20 [ 414.536584][T12301] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 414.541527][T12301] ? vfs_write+0x9ec/0x1110 [ 414.545874][T12301] kernel_clone+0x21e/0x9e0 [ 414.550209][T12301] ? __kasan_check_write+0x14/0x20 [ 414.555171][T12301] ? create_io_thread+0x1e0/0x1e0 [ 414.560018][T12301] __x64_sys_clone+0x23f/0x290 [ 414.564617][T12301] ? __do_sys_vfork+0x130/0x130 [ 414.569304][T12301] ? debug_smp_processor_id+0x17/0x20 [ 414.574512][T12301] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 414.580413][T12301] ? exit_to_user_mode_prepare+0x39/0xa0 [ 414.585881][T12301] x64_sys_call+0x1b0/0x9a0 [ 414.590226][T12301] do_syscall_64+0x3b/0xb0 [ 414.594471][T12301] ? clear_bhb_loop+0x35/0x90 [ 414.598985][T12301] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 414.604716][T12301] RIP: 0033:0x7fc01643eff9 [ 414.608968][T12301] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 414.628589][T12301] RSP: 002b:00007fc0150b7fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 414.636915][T12301] RAX: ffffffffffffffda RBX: 00007fc0165f6f80 RCX: 00007fc01643eff9 [ 414.644726][T12301] RDX: 0000000020001900 RSI: 0000000000000000 RDI: 00000000051c4000 [ 414.652534][T12301] RBP: 00007fc0150b8090 R08: 0000000020001980 R09: 0000000020001980 [ 414.660542][T12301] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 414.668401][T12301] R13: 0000000000000001 R14: 00007fc0165f6f80 R15: 00007fffebf6fa48 [ 414.676162][T12301] [ 414.703214][T12303] device pim6reg1 entered promiscuous mode [ 415.008655][T12336] FAULT_INJECTION: forcing a failure. [ 415.008655][T12336] name failslab, interval 1, probability 0, space 0, times 0 [ 415.028798][T12336] CPU: 0 PID: 12336 Comm: syz.0.3831 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 415.040004][T12336] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 415.049997][T12336] Call Trace: [ 415.053117][T12336] [ 415.055900][T12336] dump_stack_lvl+0x151/0x1c0 [ 415.060945][T12336] ? io_uring_drop_tctx_refs+0x190/0x190 [ 415.066600][T12336] dump_stack+0x15/0x20 [ 415.070870][T12336] should_fail+0x3c6/0x510 [ 415.075689][T12336] __should_failslab+0xa4/0xe0 [ 415.080863][T12336] ? vm_area_dup+0x26/0x230 [ 415.085197][T12336] should_failslab+0x9/0x20 [ 415.089633][T12336] slab_pre_alloc_hook+0x37/0xd0 [ 415.094428][T12336] ? vm_area_dup+0x26/0x230 [ 415.098744][T12336] kmem_cache_alloc+0x44/0x200 [ 415.103347][T12336] vm_area_dup+0x26/0x230 [ 415.107641][T12336] copy_mm+0x9a1/0x13e0 [ 415.111610][T12336] ? copy_signal+0x610/0x610 [ 415.116723][T12336] ? __init_rwsem+0xfe/0x1d0 [ 415.121150][T12336] ? copy_signal+0x4e3/0x610 [ 415.125779][T12336] copy_process+0x1149/0x3290 [ 415.130308][T12336] ? __kasan_check_write+0x14/0x20 [ 415.135254][T12336] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 415.141173][T12336] ? vfs_write+0x9ec/0x1110 [ 415.145513][T12336] kernel_clone+0x21e/0x9e0 [ 415.149852][T12336] ? __kasan_check_write+0x14/0x20 [ 415.154798][T12336] ? create_io_thread+0x1e0/0x1e0 [ 415.159665][T12336] __x64_sys_clone+0x23f/0x290 [ 415.164258][T12336] ? __do_sys_vfork+0x130/0x130 [ 415.168945][T12336] ? debug_smp_processor_id+0x17/0x20 [ 415.174149][T12336] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 415.180141][T12336] ? exit_to_user_mode_prepare+0x39/0xa0 [ 415.186044][T12336] x64_sys_call+0x1b0/0x9a0 [ 415.190396][T12336] do_syscall_64+0x3b/0xb0 [ 415.195068][T12336] ? clear_bhb_loop+0x35/0x90 [ 415.199583][T12336] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 415.205427][T12336] RIP: 0033:0x7fd09ab57ff9 [ 415.209654][T12336] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 415.229406][T12336] RSP: 002b:00007fd0997d0fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 415.237671][T12336] RAX: ffffffffffffffda RBX: 00007fd09ad0ff80 RCX: 00007fd09ab57ff9 [ 415.245903][T12336] RDX: 0000000020001900 RSI: 0000000000000000 RDI: 00000000051c4000 [ 415.253858][T12336] RBP: 00007fd0997d1090 R08: 0000000020001980 R09: 0000000020001980 [ 415.261597][T12336] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 415.269409][T12336] R13: 0000000000000001 R14: 00007fd09ad0ff80 R15: 00007ffe5c8cf918 [ 415.277229][T12336] [ 415.783191][T12350] device veth1_macvtap left promiscuous mode [ 415.804811][T12348] ÿÿÿÿÿÿ: renamed from vlan0 [ 415.866437][T12350] device veth1_macvtap entered promiscuous mode [ 415.877333][T12350] device macsec0 entered promiscuous mode [ 416.073429][T12362] device pim6reg1 entered promiscuous mode [ 416.161786][T12382] FAULT_INJECTION: forcing a failure. [ 416.161786][T12382] name failslab, interval 1, probability 0, space 0, times 0 [ 416.317922][T12382] CPU: 0 PID: 12382 Comm: syz.4.3848 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 416.329603][T12382] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 416.340006][T12382] Call Trace: [ 416.343298][T12382] [ 416.346075][T12382] dump_stack_lvl+0x151/0x1c0 [ 416.350850][T12382] ? io_uring_drop_tctx_refs+0x190/0x190 [ 416.356317][T12382] ? avc_denied+0x1b0/0x1b0 [ 416.360746][T12382] dump_stack+0x15/0x20 [ 416.364735][T12382] should_fail+0x3c6/0x510 [ 416.369005][T12382] __should_failslab+0xa4/0xe0 [ 416.373589][T12382] ? vm_area_dup+0x26/0x230 [ 416.378016][T12382] should_failslab+0x9/0x20 [ 416.382529][T12382] slab_pre_alloc_hook+0x37/0xd0 [ 416.387388][T12382] ? vm_area_dup+0x26/0x230 [ 416.391911][T12382] kmem_cache_alloc+0x44/0x200 [ 416.397062][T12382] vm_area_dup+0x26/0x230 [ 416.401212][T12382] copy_mm+0x9a1/0x13e0 [ 416.406337][T12382] ? copy_signal+0x610/0x610 [ 416.410756][T12382] ? __init_rwsem+0xfe/0x1d0 [ 416.415184][T12382] ? copy_signal+0x4e3/0x610 [ 416.419609][T12382] copy_process+0x1149/0x3290 [ 416.424122][T12382] ? __kasan_check_write+0x14/0x20 [ 416.429090][T12382] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 416.434016][T12382] ? vfs_write+0x9ec/0x1110 [ 416.438447][T12382] kernel_clone+0x21e/0x9e0 [ 416.442892][T12382] ? __kasan_check_write+0x14/0x20 [ 416.447816][T12382] ? create_io_thread+0x1e0/0x1e0 [ 416.452766][T12382] __x64_sys_clone+0x23f/0x290 [ 416.457395][T12382] ? __do_sys_vfork+0x130/0x130 [ 416.462065][T12382] ? debug_smp_processor_id+0x17/0x20 [ 416.467255][T12382] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 416.473167][T12382] ? exit_to_user_mode_prepare+0x39/0xa0 [ 416.478642][T12382] x64_sys_call+0x1b0/0x9a0 [ 416.483232][T12382] do_syscall_64+0x3b/0xb0 [ 416.487485][T12382] ? clear_bhb_loop+0x35/0x90 [ 416.492177][T12382] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 416.497896][T12382] RIP: 0033:0x7f90c46e3ff9 [ 416.502149][T12382] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 416.521680][T12382] RSP: 002b:00007f90c335cfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 416.529919][T12382] RAX: ffffffffffffffda RBX: 00007f90c489bf80 RCX: 00007f90c46e3ff9 [ 416.537817][T12382] RDX: 0000000020001900 RSI: 0000000000000000 RDI: 00000000051c4000 [ 416.545633][T12382] RBP: 00007f90c335d090 R08: 0000000020001980 R09: 0000000020001980 [ 416.553530][T12382] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 416.561338][T12382] R13: 0000000000000001 R14: 00007f90c489bf80 R15: 00007ffdb830c8d8 [ 416.569177][T12382] [ 417.243870][T12401] ÿÿÿÿÿÿ: renamed from vlan0 [ 417.508344][T12414] device veth1_macvtap entered promiscuous mode [ 417.514635][T12414] device macsec0 entered promiscuous mode [ 417.568037][T12429] FAULT_INJECTION: forcing a failure. [ 417.568037][T12429] name failslab, interval 1, probability 0, space 0, times 0 [ 417.580701][T12429] CPU: 0 PID: 12429 Comm: syz.4.3863 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 417.591972][T12429] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 417.602088][T12429] Call Trace: [ 417.605202][T12429] [ 417.607980][T12429] dump_stack_lvl+0x151/0x1c0 [ 417.612495][T12429] ? io_uring_drop_tctx_refs+0x190/0x190 [ 417.618061][T12429] dump_stack+0x15/0x20 [ 417.622041][T12429] should_fail+0x3c6/0x510 [ 417.626291][T12429] __should_failslab+0xa4/0xe0 [ 417.630913][T12429] ? vm_area_dup+0x26/0x230 [ 417.635239][T12429] should_failslab+0x9/0x20 [ 417.639596][T12429] slab_pre_alloc_hook+0x37/0xd0 [ 417.644376][T12429] ? vm_area_dup+0x26/0x230 [ 417.648700][T12429] kmem_cache_alloc+0x44/0x200 [ 417.653287][T12429] vm_area_dup+0x26/0x230 [ 417.657449][T12429] copy_mm+0x9a1/0x13e0 [ 417.661447][T12429] ? copy_signal+0x610/0x610 [ 417.665868][T12429] ? __init_rwsem+0xfe/0x1d0 [ 417.670297][T12429] ? copy_signal+0x4e3/0x610 [ 417.674724][T12429] copy_process+0x1149/0x3290 [ 417.679256][T12429] ? __kasan_check_write+0x14/0x20 [ 417.684206][T12429] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 417.689216][T12429] ? vfs_write+0x9ec/0x1110 [ 417.693647][T12429] kernel_clone+0x21e/0x9e0 [ 417.697984][T12429] ? __kasan_check_write+0x14/0x20 [ 417.702946][T12429] ? create_io_thread+0x1e0/0x1e0 [ 417.707913][T12429] __x64_sys_clone+0x23f/0x290 [ 417.712594][T12429] ? __do_sys_vfork+0x130/0x130 [ 417.717514][T12429] ? debug_smp_processor_id+0x17/0x20 [ 417.722708][T12429] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 417.728683][T12429] ? exit_to_user_mode_prepare+0x39/0xa0 [ 417.734149][T12429] x64_sys_call+0x1b0/0x9a0 [ 417.738489][T12429] do_syscall_64+0x3b/0xb0 [ 417.742739][T12429] ? clear_bhb_loop+0x35/0x90 [ 417.747255][T12429] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 417.752981][T12429] RIP: 0033:0x7f90c46e3ff9 [ 417.757237][T12429] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 417.776675][T12429] RSP: 002b:00007f90c335cfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 417.784929][T12429] RAX: ffffffffffffffda RBX: 00007f90c489bf80 RCX: 00007f90c46e3ff9 [ 417.792730][T12429] RDX: 0000000020001900 RSI: 0000000000000000 RDI: 00000000051c4000 [ 417.800581][T12429] RBP: 00007f90c335d090 R08: 0000000020001980 R09: 0000000020001980 [ 417.808360][T12429] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 417.816173][T12429] R13: 0000000000000001 R14: 00007f90c489bf80 R15: 00007ffdb830c8d8 [ 417.824167][T12429] [ 417.904624][T11856] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 417.963043][T12436] device pim6reg1 entered promiscuous mode [ 418.633159][T12466] FAULT_INJECTION: forcing a failure. [ 418.633159][T12466] name failslab, interval 1, probability 0, space 0, times 0 [ 418.652520][T12464] device veth1_macvtap left promiscuous mode [ 418.660131][T12464] device macsec0 left promiscuous mode [ 418.742189][T12466] CPU: 1 PID: 12466 Comm: syz.0.3876 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 418.753617][T12466] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 418.763506][T12466] Call Trace: [ 418.766632][T12466] [ 418.769409][T12466] dump_stack_lvl+0x151/0x1c0 [ 418.773924][T12466] ? io_uring_drop_tctx_refs+0x190/0x190 [ 418.779502][T12466] dump_stack+0x15/0x20 [ 418.783496][T12466] should_fail+0x3c6/0x510 [ 418.787738][T12466] __should_failslab+0xa4/0xe0 [ 418.792336][T12466] ? anon_vma_fork+0x1df/0x4e0 [ 418.796936][T12466] should_failslab+0x9/0x20 [ 418.801289][T12466] slab_pre_alloc_hook+0x37/0xd0 [ 418.806230][T12466] ? anon_vma_fork+0x1df/0x4e0 [ 418.810831][T12466] kmem_cache_alloc+0x44/0x200 [ 418.815435][T12466] anon_vma_fork+0x1df/0x4e0 [ 418.819858][T12466] copy_mm+0xa3a/0x13e0 [ 418.823856][T12466] ? copy_signal+0x610/0x610 [ 418.828313][T12466] ? __init_rwsem+0xfe/0x1d0 [ 418.832796][T12466] ? copy_signal+0x4e3/0x610 [ 418.837215][T12466] copy_process+0x1149/0x3290 [ 418.841731][T12466] ? __kasan_check_write+0x14/0x20 [ 418.846684][T12466] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 418.851623][T12466] ? vfs_write+0x9ec/0x1110 [ 418.855965][T12466] kernel_clone+0x21e/0x9e0 [ 418.860305][T12466] ? __kasan_check_write+0x14/0x20 [ 418.865251][T12466] ? create_io_thread+0x1e0/0x1e0 [ 418.870116][T12466] __x64_sys_clone+0x23f/0x290 [ 418.874712][T12466] ? __do_sys_vfork+0x130/0x130 [ 418.879412][T12466] ? debug_smp_processor_id+0x17/0x20 [ 418.884606][T12466] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 418.890510][T12466] ? exit_to_user_mode_prepare+0x39/0xa0 [ 418.896165][T12466] x64_sys_call+0x1b0/0x9a0 [ 418.900493][T12466] do_syscall_64+0x3b/0xb0 [ 418.904742][T12466] ? clear_bhb_loop+0x35/0x90 [ 418.909346][T12466] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 418.915159][T12466] RIP: 0033:0x7fd09ab57ff9 [ 418.919529][T12466] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 418.939840][T12466] RSP: 002b:00007fd0997d0fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 418.948167][T12466] RAX: ffffffffffffffda RBX: 00007fd09ad0ff80 RCX: 00007fd09ab57ff9 [ 418.956424][T12466] RDX: 0000000020001900 RSI: 0000000000000000 RDI: 00000000051c4000 [ 418.964714][T12466] RBP: 00007fd0997d1090 R08: 0000000020001980 R09: 0000000020001980 [ 418.972880][T12466] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 418.981146][T12466] R13: 0000000000000001 R14: 00007fd09ad0ff80 R15: 00007ffe5c8cf918 [ 418.988977][T12466] [ 419.109214][T12464] device veth1_macvtap entered promiscuous mode [ 419.116194][T12464] device macsec0 entered promiscuous mode [ 419.150180][ T312] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 419.161372][T12482] device pim6reg1 entered promiscuous mode [ 420.195139][T12520] device veth1_macvtap left promiscuous mode [ 420.253300][T12520] device macsec0 left promiscuous mode [ 420.645216][T12534] FAULT_INJECTION: forcing a failure. [ 420.645216][T12534] name failslab, interval 1, probability 0, space 0, times 0 [ 420.898761][T12534] CPU: 0 PID: 12534 Comm: syz.3.3901 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 420.909973][T12534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 420.919871][T12534] Call Trace: [ 420.922990][T12534] [ 420.925768][T12534] dump_stack_lvl+0x151/0x1c0 [ 420.930280][T12534] ? io_uring_drop_tctx_refs+0x190/0x190 [ 420.935748][T12534] dump_stack+0x15/0x20 [ 420.939741][T12534] should_fail+0x3c6/0x510 [ 420.944272][T12534] __should_failslab+0xa4/0xe0 [ 420.948955][T12534] ? vm_area_dup+0x26/0x230 [ 420.953653][T12534] should_failslab+0x9/0x20 [ 420.958072][T12534] slab_pre_alloc_hook+0x37/0xd0 [ 420.962848][T12534] ? vm_area_dup+0x26/0x230 [ 420.967190][T12534] kmem_cache_alloc+0x44/0x200 [ 420.971789][T12534] vm_area_dup+0x26/0x230 [ 420.975951][T12534] copy_mm+0x9a1/0x13e0 [ 420.979950][T12534] ? copy_signal+0x610/0x610 [ 420.984372][T12534] ? __init_rwsem+0xfe/0x1d0 [ 420.988798][T12534] ? copy_signal+0x4e3/0x610 [ 420.993242][T12534] copy_process+0x1149/0x3290 [ 420.997742][T12534] ? __kasan_check_write+0x14/0x20 [ 421.002690][T12534] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 421.007646][T12534] ? vfs_write+0x9ec/0x1110 [ 421.011978][T12534] kernel_clone+0x21e/0x9e0 [ 421.016396][T12534] ? __kasan_check_write+0x14/0x20 [ 421.021346][T12534] ? create_io_thread+0x1e0/0x1e0 [ 421.026394][T12534] __x64_sys_clone+0x23f/0x290 [ 421.030980][T12534] ? __do_sys_vfork+0x130/0x130 [ 421.035670][T12534] ? debug_smp_processor_id+0x17/0x20 [ 421.040886][T12534] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 421.046787][T12534] ? exit_to_user_mode_prepare+0x39/0xa0 [ 421.052245][T12534] x64_sys_call+0x1b0/0x9a0 [ 421.056584][T12534] do_syscall_64+0x3b/0xb0 [ 421.060835][T12534] ? clear_bhb_loop+0x35/0x90 [ 421.065350][T12534] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 421.071079][T12534] RIP: 0033:0x7f726e588ff9 [ 421.075335][T12534] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 421.094773][T12534] RSP: 002b:00007f726d201fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 421.103027][T12534] RAX: ffffffffffffffda RBX: 00007f726e740f80 RCX: 00007f726e588ff9 [ 421.110832][T12534] RDX: 0000000020001900 RSI: 0000000000000000 RDI: 00000000051c4000 [ 421.118650][T12534] RBP: 00007f726d202090 R08: 0000000020001980 R09: 0000000020001980 [ 421.126452][T12534] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 421.134275][T12534] R13: 0000000000000001 R14: 00007f726e740f80 R15: 00007ffd3dd8a658 [ 421.142085][T12534] [ 421.417957][T12550] device pim6reg1 entered promiscuous mode [ 421.986980][T12559] device veth1_macvtap left promiscuous mode [ 421.992917][T12559] device macsec0 left promiscuous mode [ 422.092812][T12560] device veth1_macvtap entered promiscuous mode [ 422.165402][T12560] device macsec0 entered promiscuous mode [ 422.898288][T12591] FAULT_INJECTION: forcing a failure. [ 422.898288][T12591] name failslab, interval 1, probability 0, space 0, times 0 [ 423.059845][T12595] device syzkaller0 entered promiscuous mode [ 423.147495][T12591] CPU: 0 PID: 12591 Comm: syz.0.3921 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 423.159138][T12591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 423.169914][T12591] Call Trace: [ 423.173022][T12591] [ 423.175802][T12591] dump_stack_lvl+0x151/0x1c0 [ 423.180513][T12591] ? io_uring_drop_tctx_refs+0x190/0x190 [ 423.186476][T12591] ? avc_denied+0x1b0/0x1b0 [ 423.190878][T12591] dump_stack+0x15/0x20 [ 423.194935][T12591] should_fail+0x3c6/0x510 [ 423.199712][T12591] __should_failslab+0xa4/0xe0 [ 423.204883][T12591] ? vm_area_dup+0x26/0x230 [ 423.209304][T12591] should_failslab+0x9/0x20 [ 423.215379][T12591] slab_pre_alloc_hook+0x37/0xd0 [ 423.220500][T12591] ? vm_area_dup+0x26/0x230 [ 423.225530][T12591] kmem_cache_alloc+0x44/0x200 [ 423.230865][T12591] vm_area_dup+0x26/0x230 [ 423.235026][T12591] copy_mm+0x9a1/0x13e0 [ 423.239021][T12591] ? copy_signal+0x610/0x610 [ 423.243512][T12591] ? __init_rwsem+0xfe/0x1d0 [ 423.248076][T12591] ? copy_signal+0x4e3/0x610 [ 423.252597][T12591] copy_process+0x1149/0x3290 [ 423.257169][T12591] ? __kasan_check_write+0x14/0x20 [ 423.262047][T12591] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 423.266996][T12591] ? vfs_write+0x9ec/0x1110 [ 423.271904][T12591] kernel_clone+0x21e/0x9e0 [ 423.277199][T12591] ? __kasan_check_write+0x14/0x20 [ 423.282314][T12591] ? create_io_thread+0x1e0/0x1e0 [ 423.287336][T12591] __x64_sys_clone+0x23f/0x290 [ 423.292754][T12591] ? __do_sys_vfork+0x130/0x130 [ 423.297582][T12591] ? debug_smp_processor_id+0x17/0x20 [ 423.302807][T12591] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 423.308713][T12591] ? exit_to_user_mode_prepare+0x39/0xa0 [ 423.314206][T12591] x64_sys_call+0x1b0/0x9a0 [ 423.319105][T12591] do_syscall_64+0x3b/0xb0 [ 423.323764][T12591] ? clear_bhb_loop+0x35/0x90 [ 423.328447][T12591] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 423.334262][T12591] RIP: 0033:0x7fd09ab57ff9 [ 423.338519][T12591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 423.358392][T12591] RSP: 002b:00007fd0997d0fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 423.367059][T12591] RAX: ffffffffffffffda RBX: 00007fd09ad0ff80 RCX: 00007fd09ab57ff9 [ 423.375138][T12591] RDX: 0000000020001900 RSI: 0000000000000000 RDI: 00000000051c4000 [ 423.383636][T12591] RBP: 00007fd0997d1090 R08: 0000000020001980 R09: 0000000020001980 [ 423.391736][T12591] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 423.399538][T12591] R13: 0000000000000001 R14: 00007fd09ad0ff80 R15: 00007ffe5c8cf918 [ 423.407886][T12591] [ 423.805679][T12606] device veth1_macvtap entered promiscuous mode [ 423.831994][T12606] device macsec0 entered promiscuous mode [ 423.852796][T11856] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 424.219517][T12650] FAULT_INJECTION: forcing a failure. [ 424.219517][T12650] name failslab, interval 1, probability 0, space 0, times 0 [ 424.372669][T12650] CPU: 1 PID: 12650 Comm: syz.1.3941 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 424.383893][T12650] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 424.393772][T12650] Call Trace: [ 424.396898][T12650] [ 424.399677][T12650] dump_stack_lvl+0x151/0x1c0 [ 424.404186][T12650] ? io_uring_drop_tctx_refs+0x190/0x190 [ 424.409655][T12650] dump_stack+0x15/0x20 [ 424.413744][T12650] should_fail+0x3c6/0x510 [ 424.417997][T12650] __should_failslab+0xa4/0xe0 [ 424.422597][T12650] ? vm_area_dup+0x26/0x230 [ 424.426939][T12650] should_failslab+0x9/0x20 [ 424.431276][T12650] slab_pre_alloc_hook+0x37/0xd0 [ 424.436057][T12650] ? vm_area_dup+0x26/0x230 [ 424.440389][T12650] kmem_cache_alloc+0x44/0x200 [ 424.445078][T12650] vm_area_dup+0x26/0x230 [ 424.449244][T12650] copy_mm+0x9a1/0x13e0 [ 424.453259][T12650] ? copy_signal+0x610/0x610 [ 424.457678][T12650] ? __init_rwsem+0xfe/0x1d0 [ 424.462088][T12650] ? copy_signal+0x4e3/0x610 [ 424.466537][T12650] copy_process+0x1149/0x3290 [ 424.471037][T12650] ? __kasan_check_write+0x14/0x20 [ 424.476098][T12650] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 424.481047][T12650] ? vfs_write+0x9ec/0x1110 [ 424.485555][T12650] kernel_clone+0x21e/0x9e0 [ 424.490170][T12650] ? __kasan_check_write+0x14/0x20 [ 424.495096][T12650] ? create_io_thread+0x1e0/0x1e0 [ 424.499957][T12650] __x64_sys_clone+0x23f/0x290 [ 424.504555][T12650] ? __do_sys_vfork+0x130/0x130 [ 424.509691][T12650] ? debug_smp_processor_id+0x17/0x20 [ 424.514883][T12650] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 424.520787][T12650] ? exit_to_user_mode_prepare+0x39/0xa0 [ 424.526353][T12650] x64_sys_call+0x1b0/0x9a0 [ 424.530689][T12650] do_syscall_64+0x3b/0xb0 [ 424.535013][T12650] ? clear_bhb_loop+0x35/0x90 [ 424.539547][T12650] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 424.545610][T12650] RIP: 0033:0x7fc01643eff9 [ 424.549867][T12650] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 424.569420][T12650] RSP: 002b:00007fc0150b7fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 424.577753][T12650] RAX: ffffffffffffffda RBX: 00007fc0165f6f80 RCX: 00007fc01643eff9 [ 424.585561][T12650] RDX: 0000000020001900 RSI: 0000000000000000 RDI: 00000000051c4000 [ 424.593371][T12650] RBP: 00007fc0150b8090 R08: 0000000020001980 R09: 0000000020001980 [ 424.601185][T12650] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 424.609014][T12650] R13: 0000000000000001 R14: 00007fc0165f6f80 R15: 00007fffebf6fa48 [ 424.616827][T12650] [ 424.654813][T12658] device veth1_macvtap left promiscuous mode [ 424.661152][T12658] device macsec0 left promiscuous mode [ 424.757540][T12658] device veth1_macvtap entered promiscuous mode [ 424.773176][T12658] device macsec0 entered promiscuous mode [ 425.112893][T12696] FAULT_INJECTION: forcing a failure. [ 425.112893][T12696] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 425.126030][T12696] CPU: 1 PID: 12696 Comm: syz.2.3960 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 425.137264][T12696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 425.147142][T12696] Call Trace: [ 425.150264][T12696] [ 425.153042][T12696] dump_stack_lvl+0x151/0x1c0 [ 425.157562][T12696] ? io_uring_drop_tctx_refs+0x190/0x190 [ 425.163025][T12696] ? __alloc_pages+0x27e/0x8f0 [ 425.167633][T12696] dump_stack+0x15/0x20 [ 425.171620][T12696] should_fail+0x3c6/0x510 [ 425.175873][T12696] should_fail_alloc_page+0x5a/0x80 [ 425.181432][T12696] prepare_alloc_pages+0x15c/0x700 [ 425.186459][T12696] ? page_ext_put+0x1c/0x30 [ 425.190799][T12696] ? __alloc_pages_bulk+0xe40/0xe40 [ 425.195830][T12696] ? post_alloc_hook+0x1a3/0x1b0 [ 425.200697][T12696] __alloc_pages+0x18c/0x8f0 [ 425.205130][T12696] ? prep_new_page+0x110/0x110 [ 425.209723][T12696] ? 0xffffffffa0026cdc [ 425.213711][T12696] ? is_bpf_text_address+0x172/0x190 [ 425.218836][T12696] pte_alloc_one+0x73/0x1b0 [ 425.223173][T12696] ? pfn_modify_allowed+0x2f0/0x2f0 [ 425.228297][T12696] ? arch_stack_walk+0xf3/0x140 [ 425.232990][T12696] __pte_alloc+0x86/0x350 [ 425.237147][T12696] ? free_pgtables+0x280/0x280 [ 425.241783][T12696] ? _raw_spin_lock+0xa4/0x1b0 [ 425.246353][T12696] ? __kasan_check_write+0x14/0x20 [ 425.251575][T12696] copy_page_range+0x28a8/0x2f90 [ 425.256502][T12696] ? __kasan_slab_alloc+0xb1/0xe0 [ 425.261378][T12696] ? pfn_valid+0x1e0/0x1e0 [ 425.265613][T12696] ? vma_gap_callbacks_rotate+0x1b7/0x210 [ 425.271180][T12696] ? __rb_insert_augmented+0x5de/0x610 [ 425.276467][T12696] copy_mm+0xc7e/0x13e0 [ 425.280464][T12696] ? copy_signal+0x610/0x610 [ 425.285233][T12696] ? __init_rwsem+0xfe/0x1d0 [ 425.289654][T12696] ? copy_signal+0x4e3/0x610 [ 425.294080][T12696] copy_process+0x1149/0x3290 [ 425.298596][T12696] ? __kasan_check_write+0x14/0x20 [ 425.303545][T12696] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 425.308495][T12696] ? vfs_write+0x9ec/0x1110 [ 425.312832][T12696] kernel_clone+0x21e/0x9e0 [ 425.317167][T12696] ? __kasan_check_write+0x14/0x20 [ 425.322117][T12696] ? create_io_thread+0x1e0/0x1e0 [ 425.326976][T12696] __x64_sys_clone+0x23f/0x290 [ 425.331578][T12696] ? __do_sys_vfork+0x130/0x130 [ 425.336269][T12696] ? debug_smp_processor_id+0x17/0x20 [ 425.341475][T12696] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 425.347374][T12696] ? exit_to_user_mode_prepare+0x39/0xa0 [ 425.352838][T12696] x64_sys_call+0x1b0/0x9a0 [ 425.357178][T12696] do_syscall_64+0x3b/0xb0 [ 425.361433][T12696] ? clear_bhb_loop+0x35/0x90 [ 425.365945][T12696] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 425.371764][T12696] RIP: 0033:0x7f9fd1c4cff9 [ 425.376012][T12696] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 425.395543][T12696] RSP: 002b:00007f9fd08c5fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 425.403790][T12696] RAX: ffffffffffffffda RBX: 00007f9fd1e04f80 RCX: 00007f9fd1c4cff9 [ 425.411598][T12696] RDX: 0000000020001900 RSI: 0000000000000000 RDI: 00000000051c4000 [ 425.419495][T12696] RBP: 00007f9fd08c6090 R08: 0000000020001980 R09: 0000000020001980 [ 425.427307][T12696] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 425.435654][T12696] R13: 0000000000000001 R14: 00007f9fd1e04f80 R15: 00007ffd0850e228 [ 425.443542][T12696] [ 425.632212][T12715] device veth1_macvtap left promiscuous mode [ 425.659656][T12715] device macsec0 left promiscuous mode [ 425.942930][T12746] FAULT_INJECTION: forcing a failure. [ 425.942930][T12746] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 426.098731][T12746] CPU: 1 PID: 12746 Comm: syz.4.3976 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 426.110114][T12746] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 426.120098][T12746] Call Trace: [ 426.123218][T12746] [ 426.125994][T12746] dump_stack_lvl+0x151/0x1c0 [ 426.130506][T12746] ? io_uring_drop_tctx_refs+0x190/0x190 [ 426.135977][T12746] dump_stack+0x15/0x20 [ 426.139974][T12746] should_fail+0x3c6/0x510 [ 426.144222][T12746] should_fail_alloc_page+0x5a/0x80 [ 426.149255][T12746] prepare_alloc_pages+0x15c/0x700 [ 426.154201][T12746] ? __alloc_pages+0x8f0/0x8f0 [ 426.158802][T12746] ? __alloc_pages_bulk+0xe40/0xe40 [ 426.163838][T12746] __alloc_pages+0x18c/0x8f0 [ 426.168262][T12746] ? prep_new_page+0x110/0x110 [ 426.172866][T12746] ? 0xffffffffa0028000 [ 426.176943][T12746] ? is_bpf_text_address+0x172/0x190 [ 426.182062][T12746] pte_alloc_one+0x73/0x1b0 [ 426.186458][T12746] ? pfn_modify_allowed+0x2f0/0x2f0 [ 426.191450][T12746] ? arch_stack_walk+0xf3/0x140 [ 426.196126][T12746] __pte_alloc+0x86/0x350 [ 426.200291][T12746] ? free_pgtables+0x280/0x280 [ 426.205031][T12746] ? _raw_spin_lock+0xa4/0x1b0 [ 426.209643][T12746] ? __kasan_check_write+0x14/0x20 [ 426.214572][T12746] copy_page_range+0x28a8/0x2f90 [ 426.219346][T12746] ? __kasan_slab_alloc+0xb1/0xe0 [ 426.224213][T12746] ? pfn_valid+0x1e0/0x1e0 [ 426.228458][T12746] ? vma_gap_callbacks_rotate+0x1e2/0x210 [ 426.234016][T12746] ? __rb_insert_augmented+0x5de/0x610 [ 426.239308][T12746] copy_mm+0xc7e/0x13e0 [ 426.243305][T12746] ? copy_signal+0x610/0x610 [ 426.247742][T12746] ? __init_rwsem+0xfe/0x1d0 [ 426.252152][T12746] ? copy_signal+0x4e3/0x610 [ 426.256579][T12746] copy_process+0x1149/0x3290 [ 426.261092][T12746] ? __kasan_check_write+0x14/0x20 [ 426.266043][T12746] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 426.270983][T12746] ? vfs_write+0x9ec/0x1110 [ 426.275325][T12746] kernel_clone+0x21e/0x9e0 [ 426.279665][T12746] ? __kasan_check_write+0x14/0x20 [ 426.291203][T12746] ? create_io_thread+0x1e0/0x1e0 [ 426.296243][T12746] __x64_sys_clone+0x23f/0x290 [ 426.309420][T12746] ? __do_sys_vfork+0x130/0x130 [ 426.314118][T12746] ? debug_smp_processor_id+0x17/0x20 [ 426.319314][T12746] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 426.325215][T12746] ? exit_to_user_mode_prepare+0x39/0xa0 [ 426.330697][T12746] x64_sys_call+0x1b0/0x9a0 [ 426.335024][T12746] do_syscall_64+0x3b/0xb0 [ 426.339276][T12746] ? clear_bhb_loop+0x35/0x90 [ 426.343787][T12746] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 426.349518][T12746] RIP: 0033:0x7f90c46e3ff9 [ 426.353771][T12746] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 426.373389][T12746] RSP: 002b:00007f90c335cfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 426.381628][T12746] RAX: ffffffffffffffda RBX: 00007f90c489bf80 RCX: 00007f90c46e3ff9 [ 426.389527][T12746] RDX: 0000000020001900 RSI: 0000000000000000 RDI: 00000000051c4000 [ 426.397344][T12746] RBP: 00007f90c335d090 R08: 0000000020001980 R09: 0000000020001980 [ 426.405153][T12746] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 426.412962][T12746] R13: 0000000000000001 R14: 00007f90c489bf80 R15: 00007ffdb830c8d8 [ 426.420782][T12746] [ 426.772288][T12774] device veth1_macvtap entered promiscuous mode [ 426.850376][T12774] device macsec0 entered promiscuous mode [ 427.046000][ T42] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 427.104121][T12793] bridge0: port 2(bridge_slave_1) entered disabled state [ 427.111171][T12793] bridge0: port 1(bridge_slave_0) entered disabled state [ 427.309926][T12803] device bridge_slave_1 left promiscuous mode [ 427.316022][T12803] bridge0: port 2(bridge_slave_1) entered disabled state [ 427.570282][T12803] device bridge_slave_0 left promiscuous mode [ 427.663606][T12803] bridge0: port 1(bridge_slave_0) entered disabled state [ 428.030808][T12824] device veth1_macvtap left promiscuous mode [ 428.104895][T12824] device macsec0 left promiscuous mode [ 428.249641][T12824] device veth1_macvtap entered promiscuous mode [ 428.256242][T12824] device macsec0 entered promiscuous mode [ 428.271688][T11856] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 428.341725][T12839] FAULT_INJECTION: forcing a failure. [ 428.341725][T12839] name failslab, interval 1, probability 0, space 0, times 0 [ 428.372884][T12839] CPU: 1 PID: 12839 Comm: syz.3.4009 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 428.384190][T12839] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 428.394246][T12839] Call Trace: [ 428.397456][T12839] [ 428.400235][T12839] dump_stack_lvl+0x151/0x1c0 [ 428.404746][T12839] ? io_uring_drop_tctx_refs+0x190/0x190 [ 428.410216][T12839] dump_stack+0x15/0x20 [ 428.414206][T12839] should_fail+0x3c6/0x510 [ 428.418460][T12839] __should_failslab+0xa4/0xe0 [ 428.423061][T12839] ? anon_vma_clone+0x9a/0x500 [ 428.427690][T12839] should_failslab+0x9/0x20 [ 428.431999][T12839] slab_pre_alloc_hook+0x37/0xd0 [ 428.436774][T12839] ? anon_vma_clone+0x9a/0x500 [ 428.441409][T12839] kmem_cache_alloc+0x44/0x200 [ 428.445977][T12839] anon_vma_clone+0x9a/0x500 [ 428.450401][T12839] anon_vma_fork+0x91/0x4e0 [ 428.454747][T12839] ? anon_vma_name+0x43/0x70 [ 428.459166][T12839] ? vm_area_dup+0x17a/0x230 [ 428.463599][T12839] copy_mm+0xa3a/0x13e0 [ 428.467589][T12839] ? copy_signal+0x610/0x610 [ 428.472011][T12839] ? __init_rwsem+0xfe/0x1d0 [ 428.476436][T12839] ? copy_signal+0x4e3/0x610 [ 428.480867][T12839] copy_process+0x1149/0x3290 [ 428.485395][T12839] ? __kasan_check_write+0x14/0x20 [ 428.490327][T12839] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 428.495269][T12839] ? vfs_write+0x9ec/0x1110 [ 428.499613][T12839] kernel_clone+0x21e/0x9e0 [ 428.504038][T12839] ? __kasan_check_write+0x14/0x20 [ 428.509077][T12839] ? create_io_thread+0x1e0/0x1e0 [ 428.513940][T12839] __x64_sys_clone+0x23f/0x290 [ 428.518535][T12839] ? __do_sys_vfork+0x130/0x130 [ 428.523224][T12839] ? debug_smp_processor_id+0x17/0x20 [ 428.528425][T12839] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 428.534330][T12839] ? exit_to_user_mode_prepare+0x39/0xa0 [ 428.539798][T12839] x64_sys_call+0x1b0/0x9a0 [ 428.544223][T12839] do_syscall_64+0x3b/0xb0 [ 428.548479][T12839] ? clear_bhb_loop+0x35/0x90 [ 428.552990][T12839] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 428.558755][T12839] RIP: 0033:0x7f726e588ff9 [ 428.562973][T12839] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 428.582502][T12839] RSP: 002b:00007f726d201fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 428.590751][T12839] RAX: ffffffffffffffda RBX: 00007f726e740f80 RCX: 00007f726e588ff9 [ 428.598814][T12839] RDX: 0000000020001900 RSI: 0000000000000000 RDI: 00000000051c4000 [ 428.606723][T12839] RBP: 00007f726d202090 R08: 0000000020001980 R09: 0000000020001980 [ 428.614614][T12839] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 428.622463][T12839] R13: 0000000000000001 R14: 00007f726e740f80 R15: 00007ffd3dd8a658 [ 428.630330][T12839] [ 431.676860][T12950] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 432.094266][T12950] device syzkaller0 entered promiscuous mode [ 432.419672][T12974] FAULT_INJECTION: forcing a failure. [ 432.419672][T12974] name failslab, interval 1, probability 0, space 0, times 0 [ 432.462886][T12974] CPU: 0 PID: 12974 Comm: syz.3.4054 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 432.474116][T12974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 432.484466][T12974] Call Trace: [ 432.487561][T12974] [ 432.490382][T12974] dump_stack_lvl+0x151/0x1c0 [ 432.494850][T12974] ? io_uring_drop_tctx_refs+0x190/0x190 [ 432.500335][T12974] dump_stack+0x15/0x20 [ 432.504303][T12974] should_fail+0x3c6/0x510 [ 432.508560][T12974] __should_failslab+0xa4/0xe0 [ 432.513160][T12974] ? anon_vma_fork+0x1df/0x4e0 [ 432.517759][T12974] should_failslab+0x9/0x20 [ 432.522112][T12974] slab_pre_alloc_hook+0x37/0xd0 [ 432.526969][T12974] ? anon_vma_fork+0x1df/0x4e0 [ 432.531578][T12974] kmem_cache_alloc+0x44/0x200 [ 432.536272][T12974] anon_vma_fork+0x1df/0x4e0 [ 432.540756][T12974] copy_mm+0xa3a/0x13e0 [ 432.544837][T12974] ? copy_signal+0x610/0x610 [ 432.549260][T12974] ? __init_rwsem+0xfe/0x1d0 [ 432.553785][T12974] ? copy_signal+0x4e3/0x610 [ 432.559016][T12974] copy_process+0x1149/0x3290 [ 432.563538][T12974] ? __kasan_check_write+0x14/0x20 [ 432.568477][T12974] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 432.573422][T12974] ? vfs_write+0x9ec/0x1110 [ 432.577848][T12974] kernel_clone+0x21e/0x9e0 [ 432.582183][T12974] ? __kasan_check_write+0x14/0x20 [ 432.587133][T12974] ? create_io_thread+0x1e0/0x1e0 [ 432.591995][T12974] __x64_sys_clone+0x23f/0x290 [ 432.596593][T12974] ? __do_sys_vfork+0x130/0x130 [ 432.601281][T12974] ? debug_smp_processor_id+0x17/0x20 [ 432.606489][T12974] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 432.612390][T12974] ? exit_to_user_mode_prepare+0x39/0xa0 [ 432.617865][T12974] x64_sys_call+0x1b0/0x9a0 [ 432.622198][T12974] do_syscall_64+0x3b/0xb0 [ 432.626458][T12974] ? clear_bhb_loop+0x35/0x90 [ 432.630985][T12974] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 432.636693][T12974] RIP: 0033:0x7f726e588ff9 [ 432.640947][T12974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 432.660479][T12974] RSP: 002b:00007f726d201fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 432.668893][T12974] RAX: ffffffffffffffda RBX: 00007f726e740f80 RCX: 00007f726e588ff9 [ 432.676712][T12974] RDX: 0000000020001900 RSI: 0000000000000000 RDI: 00000000051c4000 [ 432.684613][T12974] RBP: 00007f726d202090 R08: 0000000020001980 R09: 0000000020001980 [ 432.692432][T12974] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 432.700325][T12974] R13: 0000000000000001 R14: 00007f726e740f80 R15: 00007ffd3dd8a658 [ 432.708140][T12974] [ 433.161998][T13000] device syzkaller0 entered promiscuous mode [ 434.116114][T13044] FAULT_INJECTION: forcing a failure. [ 434.116114][T13044] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 434.188074][T13044] CPU: 0 PID: 13044 Comm: syz.1.4078 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 434.199811][T13044] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 434.209705][T13044] Call Trace: [ 434.212907][T13044] [ 434.215693][T13044] dump_stack_lvl+0x151/0x1c0 [ 434.220218][T13044] ? io_uring_drop_tctx_refs+0x190/0x190 [ 434.225693][T13044] dump_stack+0x15/0x20 [ 434.229662][T13044] should_fail+0x3c6/0x510 [ 434.233912][T13044] should_fail_usercopy+0x1a/0x20 [ 434.238768][T13044] _copy_from_user+0x20/0xd0 [ 434.243399][T13044] __sys_bpf+0x1e9/0x760 [ 434.247547][T13044] ? fput_many+0x160/0x1b0 [ 434.251824][T13044] ? bpf_link_show_fdinfo+0x2d0/0x2d0 [ 434.257030][T13044] ? debug_smp_processor_id+0x17/0x20 [ 434.262423][T13044] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 434.268313][T13044] __x64_sys_bpf+0x7c/0x90 [ 434.272566][T13044] x64_sys_call+0x87f/0x9a0 [ 434.276902][T13044] do_syscall_64+0x3b/0xb0 [ 434.281329][T13044] ? clear_bhb_loop+0x35/0x90 [ 434.285842][T13044] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 434.291840][T13044] RIP: 0033:0x7fc01643eff9 [ 434.296180][T13044] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 434.316231][T13044] RSP: 002b:00007fc0150b8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 434.325663][T13044] RAX: ffffffffffffffda RBX: 00007fc0165f6f80 RCX: 00007fc01643eff9 [ 434.333974][T13044] RDX: 0000000000000020 RSI: 00000000200005c0 RDI: 0000000000000012 [ 434.341883][T13044] RBP: 00007fc0150b8090 R08: 0000000000000000 R09: 0000000000000000 [ 434.349694][T13044] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 434.357500][T13044] R13: 0000000000000001 R14: 00007fc0165f6f80 R15: 00007fffebf6fa48 [ 434.365324][T13044] [ 434.438428][T13055] FAULT_INJECTION: forcing a failure. [ 434.438428][T13055] name failslab, interval 1, probability 0, space 0, times 0 [ 434.497353][T13055] CPU: 1 PID: 13055 Comm: syz.1.4081 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 434.508565][T13055] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 434.518457][T13055] Call Trace: [ 434.521577][T13055] [ 434.524358][T13055] dump_stack_lvl+0x151/0x1c0 [ 434.528869][T13055] ? io_uring_drop_tctx_refs+0x190/0x190 [ 434.534337][T13055] ? avc_denied+0x1b0/0x1b0 [ 434.538676][T13055] dump_stack+0x15/0x20 [ 434.542683][T13055] should_fail+0x3c6/0x510 [ 434.547009][T13055] __should_failslab+0xa4/0xe0 [ 434.551605][T13055] ? vm_area_dup+0x26/0x230 [ 434.555947][T13055] should_failslab+0x9/0x20 [ 434.560308][T13055] slab_pre_alloc_hook+0x37/0xd0 [ 434.565062][T13055] ? vm_area_dup+0x26/0x230 [ 434.569396][T13055] kmem_cache_alloc+0x44/0x200 [ 434.574000][T13055] vm_area_dup+0x26/0x230 [ 434.578165][T13055] copy_mm+0x9a1/0x13e0 [ 434.582161][T13055] ? copy_signal+0x610/0x610 [ 434.586583][T13055] ? __init_rwsem+0xfe/0x1d0 [ 434.591010][T13055] ? copy_signal+0x4e3/0x610 [ 434.595437][T13055] copy_process+0x1149/0x3290 [ 434.600042][T13055] ? __kasan_check_write+0x14/0x20 [ 434.604987][T13055] ? pidfd_show_fdinfo+0x2b0/0x2b0 [ 434.609935][T13055] ? vfs_write+0x9ec/0x1110 [ 434.614274][T13055] kernel_clone+0x21e/0x9e0 [ 434.618618][T13055] ? __kasan_check_write+0x14/0x20 [ 434.623605][T13055] ? create_io_thread+0x1e0/0x1e0 [ 434.628419][T13055] __x64_sys_clone+0x23f/0x290 [ 434.633021][T13055] ? __do_sys_vfork+0x130/0x130 [ 434.637708][T13055] ? debug_smp_processor_id+0x17/0x20 [ 434.642912][T13055] ? fpregs_assert_state_consistent+0xb6/0xe0 [ 434.648817][T13055] ? exit_to_user_mode_prepare+0x39/0xa0 [ 434.654284][T13055] x64_sys_call+0x1b0/0x9a0 [ 434.658625][T13055] do_syscall_64+0x3b/0xb0 [ 434.662875][T13055] ? clear_bhb_loop+0x35/0x90 [ 434.667391][T13055] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 434.673117][T13055] RIP: 0033:0x7fc01643eff9 [ 434.677374][T13055] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 434.697290][T13055] RSP: 002b:00007fc0150b7fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 434.705705][T13055] RAX: ffffffffffffffda RBX: 00007fc0165f6f80 RCX: 00007fc01643eff9 [ 434.713641][T13055] RDX: 0000000020001900 RSI: 0000000000000000 RDI: 00000000051c4000 [ 434.721435][T13055] RBP: 00007fc0150b8090 R08: 0000000020001980 R09: 0000000020001980 [ 434.729246][T13055] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 434.737089][T13055] R13: 0000000000000001 R14: 00007fc0165f6f80 R15: 00007fffebf6fa48 [ 434.744878][T13055] [ 434.967616][T13092] FAULT_INJECTION: forcing a failure. [ 434.967616][T13092] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 435.014830][T13100] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN [ 435.026376][T13100] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007] [ 435.034619][T13100] CPU: 0 PID: 13100 Comm: syz.1.4099 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 435.045903][T13100] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 435.055797][T13100] RIP: 0010:__rb_erase_color+0x20b/0xa60 [ 435.061264][T13100] Code: 49 89 de 49 c1 ee 03 43 80 3c 26 00 74 08 48 89 df e8 79 f2 2a ff 4c 8b 3b 4d 89 fc 49 c1 ec 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 04 00 74 08 4c 89 ff e8 56 f2 2a ff 41 f6 07 01 48 89 5d [ 435.076847][T13092] CPU: 1 PID: 13092 Comm: syz.0.4096 Tainted: G W 5.15.161-syzkaller-00463-g8e36931104ac #0 [ 435.080700][T13100] RSP: 0018:ffffc90000ad76a0 EFLAGS: 00010246 [ 435.091980][T13092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 [ 435.091992][T13092] Call Trace: [ 435.091998][T13092] [ 435.097885][T13100] RAX: dffffc0000000000 RBX: ffff8881144efad0 RCX: ffff88811ea9cf00 [ 435.107781][T13092] dump_stack_lvl+0x151/0x1c0 [ 435.110903][T13100] RDX: ffffffff81a56d20 RSI: ffff88810b09bdb8 RDI: ffff8881144efac0 [ 435.113682][T13092] ? io_uring_drop_tctx_refs+0x190/0x190 [ 435.121493][T13100] RBP: ffffc90000ad7700 R08: ffffffff81a54de0 R09: ffffed10216137bb [ 435.126010][T13092] dump_stack+0x15/0x20 [ 435.133820][T13100] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 435.139287][T13092] should_fail+0x3c6/0x510 [ 435.147098][T13100] R13: ffff8881144efac0 R14: 1ffff1102289df5a R15: 0000000000000000 [ 435.151108][T13092] should_fail_usercopy+0x1a/0x20 [ 435.158900][T13100] FS: 0000000000000000(0000) GS:ffff8881f7000000(0000) knlGS:0000000000000000 [ 435.163256][T13092] _copy_to_user+0x20/0x90 [ 435.171069][T13100] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 435.175930][T13092] simple_read_from_buffer+0xc7/0x150 [ 435.184747][T13100] CR2: ffffffffd88f0000 CR3: 00000001207e5000 CR4: 00000000003506b0 [ 435.188939][T13092] proc_fail_nth_read+0x1a3/0x210 [ 435.195362][T13100] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 435.200572][T13092] ? proc_fault_inject_write+0x390/0x390 [ 435.208380][T13100] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 435.213249][T13092] ? fsnotify_perm+0x470/0x5d0 [ 435.221056][T13100] Call Trace: [ 435.226530][T13092] ? security_file_permission+0x86/0xb0 [ 435.234341][T13100] [ 435.238931][T13092] ? proc_fault_inject_write+0x390/0x390 [ 435.242069][T13100] ? __die_body+0x62/0xb0 [ 435.247440][T13092] vfs_read+0x27d/0xd40 [ 435.250215][T13100] ? die_addr+0x9f/0xd0 [ 435.255687][T13092] ? kernel_read+0x1f0/0x1f0 [ 435.259937][T13100] ? exc_general_protection+0x311/0x4b0 [ 435.263926][T13092] ? __kasan_check_write+0x14/0x20 [ 435.267926][T13100] ? asm_exc_general_protection+0x27/0x30 [ 435.272344][T13092] ? mutex_lock+0xb6/0x1e0 [ 435.277728][T13100] ? vma_interval_tree_remove+0xae0/0xba0 [ 435.282675][T13092] ? wait_for_completion_killable_timeout+0x10/0x10 [ 435.288228][T13100] ? anon_vma_interval_tree_iter_next+0x390/0x390 [ 435.292585][T13092] ? __fdget_pos+0x2e7/0x3a0 [ 435.298138][T13100] ? __rb_erase_color+0x20b/0xa60 [ 435.304548][T13092] ? ksys_read+0x77/0x2c0 [ 435.310797][T13100] ? anon_vma_interval_tree_iter_next+0x390/0x390 [ 435.315234][T13092] ksys_read+0x199/0x2c0 [ 435.320089][T13100] ? rwsem_mark_wake+0x770/0x770 [ 435.324261][T13092] ? irqentry_exit+0x30/0x40 [ 435.330500][T13100] vma_interval_tree_remove+0xb82/0xba0 [ 435.334578][T13092] ? vfs_write+0x1110/0x1110 [ 435.339456][T13100] unlink_file_vma+0xd9/0xf0 [ 435.343981][T13092] __x64_sys_read+0x7b/0x90 [ 435.349362][T13100] free_pgtables+0x13f/0x280 [ 435.353878][T13092] x64_sys_call+0x28/0x9a0 [ 435.358315][T13100] exit_mmap+0x405/0x940 [ 435.362764][T13092] do_syscall_64+0x3b/0xb0 [ 435.367278][T13100] ? exit_aio+0x25e/0x3c0 [ 435.371537][T13092] ? clear_bhb_loop+0x35/0x90 [ 435.375604][T13100] ? vm_brk+0x30/0x30 [ 435.379859][T13092] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 435.384025][T13100] ? mutex_unlock+0xb2/0x260 [ 435.388538][T13092] RIP: 0033:0x7fd09ab56a3c [ 435.392366][T13100] ? uprobe_clear_state+0x2cd/0x320 [ 435.398100][T13092] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 69 8e 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 bf 8e 02 00 48 [ 435.402513][T13100] __mmput+0x95/0x310 [ 435.406763][T13092] RSP: 002b:00007fd0997d1030 EFLAGS: 00000246 [ 435.411800][T13100] mmput+0x5b/0x170 [ 435.431248][T13092] ORIG_RAX: 0000000000000000 [ 435.435077][T13100] do_exit+0xb9c/0x2ca0 [ 435.441783][T13092] RAX: ffffffffffffffda RBX: 00007fd09ad0ff80 RCX: 00007fd09ab56a3c [ 435.446123][T13100] ? put_task_struct+0x80/0x80 [ 435.450731][T13092] RDX: 000000000000000f RSI: 00007fd0997d10a0 RDI: 0000000000000008 [ 435.454704][T13100] ? __kasan_check_write+0x14/0x20 [ 435.462515][T13092] RBP: 00007fd0997d1090 R08: 0000000000000000 R09: 0000000000000000 [ 435.467116][T13100] ? _raw_spin_lock_irq+0xa5/0x1b0 [ 435.474935][T13092] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 435.479977][T13100] ? _raw_spin_lock_irqsave+0x210/0x210 [ 435.487773][T13092] R13: 0000000000000000 R14: 00007fd09ad0ff80 R15: 00007ffe5c8cf918 [ 435.492732][T13100] do_group_exit+0x141/0x310 [ 435.500538][T13092] [ 435.505913][T13100] get_signal+0x7a3/0x1630 [ 435.525287][T13100] arch_do_signal_or_restart+0xbd/0x1680 [ 435.530860][T13100] ? local_bh_enable+0x1f/0x30 [ 435.535444][T13100] ? alloc_empty_file_noaccount+0x80/0x80 [ 435.541000][T13100] ? put_pid+0xc3/0x110 [ 435.545103][T13100] ? preempt_count_add+0x92/0x1a0 [ 435.550201][T13100] ? get_sigframe_size+0x10/0x10 [ 435.555234][T13100] ? __sys_socketpair+0x61c/0x6e0 [ 435.560127][T13100] ? fpu_flush_thread+0xf0/0xf0 [ 435.564777][T13100] exit_to_user_mode_loop+0xa0/0xe0 [ 435.569814][T13100] exit_to_user_mode_prepare+0x5a/0xa0 [ 435.575109][T13100] syscall_exit_to_user_mode+0x26/0x160 [ 435.580490][T13100] do_syscall_64+0x47/0xb0 [ 435.584739][T13100] ? clear_bhb_loop+0x35/0x90 [ 435.589253][T13100] entry_SYSCALL_64_after_hwframe+0x66/0xd0 [ 435.594983][T13100] RIP: 0033:0x7fc01643eff9 [ 435.599438][T13100] Code: Unable to access opcode bytes at RIP 0x7fc01643efcf. [ 435.606621][T13100] RSP: 002b:00007fc0150b8038 EFLAGS: 00000246 ORIG_RAX: 0000000000000035 [ 435.614857][T13100] RAX: 0000000000000000 RBX: 00007fc0165f6f80 RCX: 00007fc01643eff9 [ 435.622673][T13100] RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000001 [ 435.630568][T13100] RBP: 00007fc0164b1296 R08: 0000000000000000 R09: 0000000000000000 [ 435.638375][T13100] R10: 0000000020000e00 R11: 0000000000000246 R12: 0000000000000000 [ 435.646189][T13100] R13: 0000000000000000 R14: 00007fc0165f6f80 R15: 00007fffebf6fa48 [ 435.654108][T13100] [ 435.656949][T13100] Modules linked in: [ 435.666966][T13100] ---[ end trace bcdc3422ec235e49 ]--- [ 435.672434][T13100] RIP: 0010:__rb_erase_color+0x20b/0xa60 [ 435.678381][T13100] Code: 49 89 de 49 c1 ee 03 43 80 3c 26 00 74 08 48 89 df e8 79 f2 2a ff 4c 8b 3b 4d 89 fc 49 c1 ec 03 48 b8 00 00 00 00 00 fc ff df <41> 80 3c 04 00 74 08 4c 89 ff e8 56 f2 2a ff 41 f6 07 01 48 89 5d [ 435.698709][T13100] RSP: 0018:ffffc90000ad76a0 EFLAGS: 00010246 [ 435.704702][T13100] RAX: dffffc0000000000 RBX: ffff8881144efad0 RCX: ffff88811ea9cf00 [ 435.712456][T13100] RDX: ffffffff81a56d20 RSI: ffff88810b09bdb8 RDI: ffff8881144efac0 [ 435.720714][T13100] RBP: ffffc90000ad7700 R08: ffffffff81a54de0 R09: ffffed10216137bb [ 435.728851][T13100] R10: 0000000000000000 R11: dffffc0000000001 R12: 0000000000000000 [ 435.739312][T13100] R13: ffff8881144efac0 R14: 1ffff1102289df5a R15: 0000000000000000 [ 435.747219][T13100] FS: 0000000000000000(0000) GS:ffff8881f7100000(0000) knlGS:0000000000000000 [ 435.756737][T13100] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 435.763275][T13100] CR2: 0000000000000000 CR3: 000000011aa40000 CR4: 00000000003506a0 [ 435.771638][T13100] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 435.779763][T13100] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 435.787904][T13100] Kernel panic - not syncing: Fatal exception [ 435.794065][T13100] Kernel Offset: disabled [ 435.798193][T13100] Rebooting in 86400 seconds..